Cybersecurity Spyware for System Privacy and Antivirus Testing
Keywords:
Antivirus testing, Cybersecurity, Data encryption, Ethical hacking, Keylogging, Privacy, SpywareAbstract
The growing sophistication of cybersecurity threats, particularly through keylogging software, poses significant risks to individual privacy and organizational security. This work proposes an integrated solution that combines advanced surveillance techniques with robust security measures to detect and mitigate keylogging threats. The system captures and analyzes user activity through keystroke logging, screen capture, audio recording, and webcam snapshots, securely transmitting data to A Mailtrap server integrated with cloud storage and HeidiSQL for efficient management. Strong encryption ensures data. security, while the system’s dual-use nature highlights both its potential as a security tool and its privacy risks. By simulating real-world spyware, this research evaluates the effectiveness of antivirus software in detecting advanced keylogging threats, emphasizing the need for enhanced detection mechanisms and ethical frameworks to balance security and privacy. The goal is to provide a proactive framework for managing keylogging threats, ensuring a more secure digital environment.
References
T. Olzak, “Keystroke Logging (Keylogging),” 2008. Available: https://adventuresinsecurity.com/images/Keystroke_Logging.pdf
S. Yadav, A. Mahajan, M. Prasad, and A. Kumar, “Advanced Keylogger for Ethical Hacking,” International Journal of Engineering Applied Sciences and Technology, vol. 5, no. 1, pp. 634–638, May 2020, doi: https://doi.org/10.33564/ijeast.2020.v05i01.112.
E. Victoria, A. Ayodele, and A. Ayodele, “Keylogger Detection: A Systematic Review,” IEEE Xplore, Apr. 01, 2023. https://ieeexplore.ieee.org/abstract/document/1012447.
A. Solairaj, S. C. Prabanand, J. Mathalairaj, C. Prathap, and L. S. Vignesh, “Keyloggers software detection techniques,” 2016 10th International Conference on Intelligent Systems and Control (ISCO), Jan. 2016, doi: https://doi.org/10.1109/isco.2016.7726880.
K. M. Hosny, M. A. Zaki, N. A. Lashin, M. M. Fouda, and H. M. Hamza, “Multimedia Security Using Encryption: A Survey,” IEEE Access, vol. 11, pp. 63027–63056, Jan. 2023, doi: https://doi.org/10.1109/access.2023.3287858.
J. Navarro, E. Naudon, and D. Oliveira, “Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers,” 2012 IEEE Symposium on Security and Privacy Workshops, May 2012, doi: https://doi.org/10.1109/spw.2012.22.
S. Sagiroglu and G. Canbek, “Keyloggers,” IEEE Technology and Society Magazine, vol. 28, no. 3, pp. 10–17, 2009, doi: https://doi.org/10.1109/mts.2009.934159.
P. Mell, K. Kent, and J. Nusbaum, “Special Publication 800-83 Sponsored by the Department of Homeland Security Guide to Malware Incident Prevention and Handling Recommendations of the National Institute of Standards and Technology.” Available: https://tim.kehres.com/docs/nist/SP800-83.pdf
H. Huseynov, K. Kourai, T. Saadawi, and O. Igbe, “Virtual Machine Introspection for Anomaly-Based Keylogger Detection,” IEEE Xplore, May 01, 2020. https://ieeexplore.ieee.org/document/9098980.
A. Wajahat, A. Imran, J. Latif, A. Nazir, and A. Bilal, “A Novel Approach of Unprivileged Keylogger Detection,” IEEE Xplore, Jan. 01, 2019. https://ieeexplore.ieee.org/document/8673404.
S. Kumar, R. Sehgal, and J. S. Bhatia, “Hybrid honeypot framework for malware collection and analysis,” IEEE Xplore, Aug. 01, 2012. https://ieeexplore.ieee.org/abstract/document/6304786
F. Skopik, G. Settanni, and R. Fiedler, “A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing,” Computers & Security, vol. 60, pp. 154–176, Jul. 2016, doi: https://doi.org/10.1016/j.cose.2016.04.003.
S. Gunalakshmii and P. Ezhumalai, “Mobile keylogger detection using machine learning technique,” IEEE Xplore, Feb. 01, 2014. https://ieeexplore.ieee.org/abstract/document/7068167
S. Rai, V. Choubey, Suryansh, and P. Garg, “A Systematic Review of Encryption and Keylogging for Computer System Security,” IEEE Xplore, Jul. 01, 2022. https://ieeexplore.ieee.org/abstract/document/9913618
F. Ullah, M. Edwards, R. Ramdhany, R. Chitchyan, M. A. Babar, and A. Rashid, “Data exfiltration: A review of external attack vectors and countermeasures,” Journal of Network and Computer Applications, vol. 101, pp. 18–54, Jan. 2018, doi: https://doi.org/10.1016/j.jnca.2017.10.016.
W. Wang, R. Sun, M. Xue, and D. C. Ranasinghe, “An automated assessment of Android clipboards,” ASE ’20: Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, Dec. 2020, doi: https://doi.org/10.1145/3324884.3418905.
X. Luo, J. Wang, Q. Shen, J. Wang, and Q. Qi, “User behavior analysis based on user interest by web log mining,” 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–5, Nov. 2017, doi: https://doi.org/10.1109/atnac.2017.8215435.
Z. Fink, S. Liu, J. Choi, M. Diener, and L. V. Kale, “Performance Evaluation of Python Parallel Programming Models: Charm4Py and mpi4py,” 2021 IEEE/ACM 6th International Workshop on Extreme Scale Programming Models and Middleware (ESPM2), pp. 38–44, Nov. 2021, doi: https://doi.org/10.1109/espm254806.2021.00010.
A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial internet of things,” Proceedings of the 52nd Annual Design Automation Conference on - DAC ’15, 2015, doi: https://doi.org/10.1145/2744769.2747942.