Figure 1 - available via license: Creative Commons Attribution 3.0 Unported
Content may be subject to copyright.
Keylogger Process in User Activity 

Keylogger Process in User Activity 

Source publication
Article
Full-text available
The development of technology is very fast, especially in the field of Internet technology that at any time experiencing significant changes, The development also supported by the ability of human resources, Keylogger is a tool that most developed because this application is very rarely recognized a malicious program by antivirus, keylogger will re...

Citations

... Robbi Rahim et al. [5] described the methodology detailed in the article, which outlines the creation and operation of keyloggers, encompassing both hardware and software variants. Keyloggers, tools designed to monitor keyboard inputs, record keystrokes in log files, and sometimes transmit data to designated email addresses, have dual utility for legitimate applications such as employee monitoring and potentially malicious activities like data theft. ...
... Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 November 2023 doi:10.20944/preprints202311.0664.v118 ...
Preprint
Full-text available
Since the advent of the Internet, there has been a significant shift from wired to wireless communication between devices. The volume of data transmitted has surged, primarily driven by the exponential growth of network services, Internet of Things (IoT) devices, and online users. This trend became especially pronounced with the onset of the COVID-19 pandemic, as the Internet's role and significance expanded dramatically. People began to spend more time online, engaging in activities like e-learning, remote work, and online shopping. Concurrently, concerns about the security of wireless communication channels have escalated. As more data is stored and transmitted over the Internet, cybercriminals are actively seeking unauthorized access to it to further their malicious objectives. Through a comprehensive literature review in the realm of wireless network security and privacy, it has become evident that several factors render these networks susceptible to vulnerabilities. The aim of this paper is to shed light on the major and common security and privacy challenges faced by existing wireless networks. Additionally, it seeks to demonstrate the array of techniques available to mitigate these issues. Ultimately, this paper will culminate in an in-depth analysis of cybersecurity measures to address the issues in wireless networks.
... Keyloggers often lack intelligence, but logs provide details about each keyboard event and each ap-plication that the user clicked or entered. Despite the absence of information regarding the application being used, logs offer sufficient proof to reveal what users are doing [10]. ...
... They have also looked at the various sorts of software keyloggers. Authors in [10], experimented on Keylogger by applying an exact string matching algorithm accomplished by using an application designed using Visual C#. After evaluation, they found that the results are accurately captured in key logs. ...
... The attacker can in fact closely examine in real time all the victim's actions during the navigation in the target web app and record the entire session. A keylogger [30] can easily be positioned in the malicious web browser to record keystrokes (e.g. for usernames, IDs and passwords). By a webproxy [31] or suitable add-ons installed in the malicious web browser, all the traffic (e.g. ...
Article
Full-text available
Man-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field. Main goal of MitM is to compromise confidentiality, integrity and availability of data flowing between source and destination. However, most of its many variants involve difficulties that make it not always possible. The present paper aims at modelling and describing a new method of attack, named Browser-in-the-Middle (BitM) which, despite the similarities with MitM in the way it controls the data flow between a client and the service it accesses, bypasses some of MitM’s typical shortcomings. It could be started by phishing techniques and in some cases coupled to the well-known Man-in-the-Browser (MitB) attack. It will be seen how BitM expands the range of the possible attacker’s actions, at the same time making them easier to implement. Among its features, the absence of the need to install malware of any kind on the victim’s machine and the total control it allows the attacker are to be emphasized.
... Keylogger adalah salah satu jenis spywares. Keylogger berfungsi mencuri informasi pengguna, melacak setiap pengguna keyboard keystroke, dan menyimpannya dalam bentuk log file [21]. ...
Article
The Internet has changed the world. The penetration of internet users in 1995 is only 1 percent of the world population, while in 2018, the figure reached 70 percent or 4.5 billion users. Simultaneously, it was reported that eight of the top ten web sites in the world were at a critical point of vulnerability to attacks by injection methods, such as Cross-Site Scripting (XSS) and Structured Query Language Injection (SQLi). Furthermore, XSS and SQLi attacks can be used by certain parties to steal information or specific purposes. In this paper, we research by conducting attack simulations, analyzing packet data, and finally conducting prevention at host-based. Initial simulations of attacks using social engineering attack techniques by sending a phishing email. At this stage of attack simulation, the attack includes information gathering, webcam screenshots, keyloggers, and spoofers. Furthermore, at the stage of analysis, we do with the approach of network forensics with evidence collection techniques using live forensics acquisition. The final stage is prevent (patching) by creating an application or add-on on the browser side by name, XSSFilterAde. This research contribution offers a broad and in-depth study of how to do a simulation, analysis, and finally prevent. Furthermore, the method of protecting the user or host- based solution in the browser application functions to filter, disable plugins, notify, block, and reduce injection attacks.Internet telah mengubah dunia. Internet telah mengubah wajah dunia. Penetrasi pengguna internet di tahun 1995 hanya 1 persen dari populasi dunia, sedangkan di tahun 2018 angkanya telah mencapai 60 persen atau 4,5 miliar pengguna. Secara bersamaan, dilaporkan delapan dari sepuluh situs web teratas di dunia berada pada titik kritis kerentanan terhadap serangan dengan metode injeksi, seperti: Cross-Site Scripting (XSS) dan Structured Query Language Injection (SQLi). Selanjutnya, serangan XSS dan SQLi dapat digunakan oleh pihak tertentu untuk mencuri informasi atau untuk tujuan tertentu. Dalam makalah ini, penelitian dilakukan denganmensimulasikan serangan, analisis paket data, dan terakhir melakukan pencegahan di host-based atau di sisi pengguna. Simulasi awal serangan menggunakan social engineering attack dengan cara mengirim sebuah phishing email. Pada tahapan simulasi serangan ini, serangan meliputi pengumpulan informasi, screenshot webcam, keyloggers, dan spoofer. Selanjutnya, di tahapan analisis, kami melakukan pendekatan network forensics dengan teknik pengambilan barang bukti menggunakan metode live forensics acquisition. Tahapan terakhir adalah mencegah (menambal) dengan membuat sebuah aplikasi atau add-on di sisi browser dengan nama XSSFilterAde. Kontribusi penelitian ini menawarkan sebuah studi secara luas dan mendalam tentang bagaimana melakukan sebuah simulasi,analisis, dan, terahir, melakukan pencegahan (prevent). Lebih jauh, metode solusi perlindungan kepada pengguna atau host-based dalam aplikasi browser berfungsi untuk memfilter, menonaktifkan plugin, memberi tahu, memblokir, dan mengurangi serangan injeksi.
... String matching adalah proses yang terjadi secara komputasi melalui input string menggunakan keyboard pada komputer [7]. Pada proses pencocokan string dilakukan pengecekan antara string pattern dengan string text dimana arah pergeseran karakter pattern dalam pencocokan terhadap karakter text ditentukan oleh algoritma string yang digunakan [8] [9]. ...
Article
Companies engaged in the chemical industry really need Human Resources (HR) who have knowledge in the field of chemical industry engineering terms in order to achieve the company's main goals, but due to the chemical industry engineering terms that use foreign languages is essentially difficult to understand not a few of the general public who have desire to work in companies in the chemical industry engineering experience problems in mastering the knowledge needed by chemical industry engineering companies. Therefore it is necessary to have an application that adopts science related to the chemical industry engineering term along with good search features. The application that was built to search for information related to chemical industry engineering terms in this study implements the smith algorithm as an algorithm that serves to minimize the use of the time needed in the search process. The smith algorithm notices that counting the number of shifts with the text character that is located right next to the window character on the rightmost text can sometimes provide a shorter shift than using the rightmost window text character. Then he gives a solution to take the maximum between the two values. The application term of chemical industry engineering research was built using visual basic net 2008 and can be operated properly on personal computers supported by Windows OS. Keywords: Chemical Industry Engineering Terms, String Matching, Algorithms, Smith.
... String adalah suatu frase, kata, atau kalimat [5]. String matching adalah metode pencocokan karakter yang diadopsi melalui proses input menggunakan keyboard [6]. String matching pada dasarnya terbagi atas dua bagian, yaitu exact matching dan heuristic matching. ...
Article
The word fashion is synonymous with fashion, in today's digital era fashion has become a lifestyle that can introduce personality through fashion on social media. In the term fashion, there are many terms that form the basis of knowledge to match one's fashion. The term fashion is generally studied using foreign languages so that many ordinary people find it difficult to understand in more detail related to fashion terms so that there is a need for applications that adopt science related to the term fashion. An application that was built with the main objective to search for information such as fashion terms is inseparable from the existence of string matching. String matching can be interpreted as an activity that works to match something that is sought in a container with the contents stored in the container. Algortima string matching which is implemented to search for the meaning of the term fashion in this study is the Horspool algorithm. The horspool algorithm is a boyer-moore derivative algorithm, to go through the process when there is a mismatch of character patterns with text characters, the horspool algorithm uses bad-matches repeatedly until all the character patterns are found to have a match against the text. The results of the application built in this study can facilitate ordinary people who have difficulty finding information related to fashion terms more easily.Keywords: Implementation, Fashion Terms, Algorithms, Horspool
... The production process can also be assisted by using ICT devices [2].However, things that need to be considered in ensuring the use of ICT can work well in the production process are problems related to system security [3]. There are several methods that can be used to ensure system security [4][5] [6].The production process can also use ICT for the calculation process that demands high accuracy [7] and also search problems [8].ICT-based systems also provide services for decision making[9] [10][11] [12].It should be noted that the most important thing is the application of ICT-based benchmarking processes in the production process [13]. This is important to ensure that production results can be at an efficient level.this is important to ensure that production results can be at an efficient level [14] [15].When there is an inefficient process, this needs to be assessed about the inputs needed and the output produced [16] [17].The application of a web-based system is the most common example in the implementation of the ICT process [18] [19]. ...
Article
Full-text available
Maintenance is an activity to maintain facilities or equipment of the factory and make repairs or adjustments to the necessary replacement to satisfactory condition of production operations in accordance with what is planned. Companies often experience damage to the Blowing machine so that interconnected machines cannot be operated. The purpose of this study was to improve the performance of Blowing line 4 engines with the Total Productive Maintenance (TPM) method at PT. Coca-Cola Amatil Indonesia Medan Unit, also to determine the level of Blowing machine performance based on the analysis of overall equipment effectiveness (OEE) at PT. Coca-Cola Amatil Indonesia Medan Unit. The method used in this study is the overall equipment effectiveness (OEE) method to measure Ishikawa’s treatments and diagrams to compare and propose low engine performance. The results of data processing shows machine maintenance has not comply the OEE standards in July 81.48%, August 81.48%, September 78.07%, October 81.22%, November 78.08%, and those that fill the standards in June amount to 86.48%, with losses that most affect the effectiveness of equipment in line 4 blowroom machine is Equipment Failure Losses of 11.42% based on the results of the study, the proposed improvement in engine performance is to provide training to employees, and increase operator awareness. against engine damage, thus the production process will run smoothly.
... [3] proposed [4] using prime number comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm for generate prime number that can be used in cryptography. The research of [5] using keylogger for monitoring user activity, and [6] using deterministic dynamic programming algorithm. The usage of cryptography can be applied in website to ensure the web security [7], [8], [9]. ...
Article
Full-text available
The development of science and technology is advancing. Therefore, the data security needs to be applied. Cryptography is one of the sciences that learn mathematical techniques related to aspects of information security such as secrecy. One of them is known as Arnold Cat Map (ACM) algorithm on encryption and decryption by iterating digital images to secure an image. Arnold Cat Map (ACM) algorithm is one of the common cryptographic algorithms used to encrypt images. Application designed to secure an image by performing the process of randomizing the image pixel, the randomized image will change the pixel position based on the Arnold Cat Map method, then encryption and then the image encryption results become unknown. The result of the Arnold Cat Map method is that the random pixel position will return to its original position after going through several iterations with reference to the image capacity, where if the image size is different, the iteration will return to the original with different iteration point at time of encryption or decryption system by Arnold Cat Map method.
... The development of information technology is growing very rapidly, especially in the field of information and almost many aspect already impact with technology [1]- [4]. One of the technology is Internet, Internet makes it easier for us to search the information we need or we can do many things with internet such as banking, online shop, remote, monitoring chatting and there's a lot of thing can to do [5], [6]. Accessing the internet more faster because of the increasingly sophisticated technology and supported data management in a fast, precise and efficient and excellent data storage space, thus the information we need becomes easier to obtain and easy to use by every user [7]. ...
Article
Full-text available
The condition of a room of both humidity and temperature is very important for specific activities, to know the condition of the room from the humidity and temperature can be designed a prototype of humidity and temperature by using few components such as DHT 11 sensor, Arduino UNO R3, 2x16 LCD, I2C LCD. The designed prototype applies the Internet of Things connectivity so that humidity and temperature information can be quickly sent to Android applications that user have. This prototype can be used well with accurate results every second and even every second data will be sent using internet connection, and also this prototype can be used as a learning media for students who want to know how microcontroller, Arduino, and IOT work.