Skip to main content

Advanced Cyber Hiding of Key Logging During Cyber Communication

  • Conference paper
  • First Online:
Computing and Network Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 12))

  • 771 Accesses

Abstract

Software program key loggers were used to spy on laptop users to accumulate sensitive statistics for decades. Their primary attention has been to seize keystroke statistics from keyboards. Cyber assaults targeting critical infrastructure using this information could bring about tremendous catastrophic structure failures. It is important to shield society in this age of modern technology. Online security risks manipulate the extended complexness and connection of critical facilities components, linked to a country’s security, economic climate, and public security. Prior techniques have focused on using dedication techniques that are cryptographic primitives only protecting data stored in RREP and RREQ message formats as part of a sequential execution of tasks. These techniques proven to be effective, might be used along with attack recognition techniques for determining affected routers to increase overall system security by marginalizing the working limitations of an attacker, thus jeopardizing their visibility. A realistic execution validates our claim.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moses S, Larson A, Mercado J (2015) Touch interface and key logging malware. In: 2015 11th international conference on innovations in information technology (IIT)

    Google Scholar 

  2. Business Verizon (2014) 2014 data breach investigations report. Verizon Bus J 2014(1):1–60

    Google Scholar 

  3. V. E. Solutions (2015) 2015 DBIR contributors. Verizon Bus J (2015)

    Google Scholar 

  4. Sagiroglu S, Canbek G (2009) Key loggers: increasing threats to computer security and privacy. IEEE Technol Soc Mag 28(3):10–17

    Article  Google Scholar 

  5. Wood CA, Raj RK (2015) Key loggers in cyber security education

    Google Scholar 

  6. Aron J (2015) Smartphone jiggles reveal your private data. New Sci 211(2825)

    Google Scholar 

  7. Demopoulos D, Kambourakis G, Grizzlies S (2013) From key loggers to touch loggers: take the rough with the smooth. Comput Secur 32:102–114

    Article  Google Scholar 

  8. Holz T, Engel Berth M, Freiling F (2009) Learning more about the underground economy: a case-study of key loggers and drop zones. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics), LNCS, vol 5789, pp 1–18

    Google Scholar 

  9. Framework for Improving Critical Infrastructure Cyber security. Version 1.0 National Institute of Standards and Technology, 12 Feb 2014

    Google Scholar 

  10. PWC (2015) Managing cyber risks in an interconnected world, Sept 2014

    Google Scholar 

  11. ICS-CERT (2014) Alert (ICS-ALERT-11-343-01A)

    Google Scholar 

  12. Jacobson M, Ramzan Z (eds) (2008) Crime ware: understanding new attacks and defenses. Safari Technical Books

    Google Scholar 

  13. Coffman S (2011) USSS malware update for FS/ISAC, 14 Mar 2011

    Google Scholar 

  14. Panda Labs (2010) Panda labs annual report 2010. http://www.pandasecurity.com

  15. FS-ISAC (2011) Threat viewpoint, advanced persistent threat

    Google Scholar 

  16. Krebs B (2010) ‘Stuxnet’ worm far more sophisticated than previously thought. KregsOnSecurity.com, 22 Sept 2010

    Google Scholar 

  17. Winfield N, Worthier B (2010) Microsoft battles cyber criminals. Wall Street J

    Google Scholar 

  18. Profane A, Lazes L (2011) Packet-hiding methods for preventing selective jamming attacks. Proc IEEE Trans Dependable Secure Comput 9(1)

    Google Scholar 

  19. Perkins C, Belding-Royer E, Das S (2003) RFC 3561: ad hoc on demand distance vector (AODV) routing. Internet RFCs

    Google Scholar 

  20. Popper C, Strasser M, ˇCapkun S (2009) Jamming-resistant broadcast communication without shared keys. In: Proceedings of the USENIX security symposium

    Google Scholar 

  21. Rivest R (1997) All-or-nothing encryption and the package transform. Lecture notes in computer science, pp 210–218

    Google Scholar 

  22. Rivest R, Shamir A, Wagner D (1996) Time-lock puzzles and timed release crypto. Massachusetts Institute of Technology

    Google Scholar 

  23. Schneider B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley

    Google Scholar 

  24. Stinginess (2010) Break DES in less than a single day. http://www.sciengines.com

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Veeraiah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Veeraiah, D., Vasumathi, D. (2017). Advanced Cyber Hiding of Key Logging During Cyber Communication. In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3935-5_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3934-8

  • Online ISBN: 978-981-10-3935-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics