IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Advanced Encryption-Based Keylogger for System Security

Advanced Encryption-Based Keylogger for System Security
View Sample PDF
Author(s): V. R. Balasaraswathi (Vellore Institute of Technology, Chennai, India), Ashiq Noor Sudheer (Vellore Institute of Technology, Chennai, India), Gautham Vidyashankar (Vellore Institute of Technology, Chennai, India), Kevin Sebastian (Vellore Institute of Technology, Chennai, India)and Priyanshu Pattanaik (Vellore Institute of Technology, Chennai, India)
Copyright: 2025
Pages: 20
Source title: Cryptography, Biometrics, and Anonymity in Cybersecurity Management
Source Author(s)/Editor(s): Mohammed Amin Almaiah (Department of Computer Science, The University of Jordan, Jordan)and Said Salloum (School of Science, Engineering, and Environment, University of Salford, UK)
DOI: 10.4018/979-8-3693-8014-7.ch008

Purchase

View Advanced Encryption-Based Keylogger for System Security on the publisher's website for pricing and purchasing information.

Abstract

Our research presents a paradigm shift in network security, combining advanced technology to transcend conventional keyloggers. This software aims to revolutionize monitoring capabilities, specifically targeting keystrokes, while concurrently implementing text encryption mechanisms for log files. Our primary objective is to transform the traditionally perceived risks associated with keyloggers into practical benefits. This keylogger, designed to capture keystrokes, extends its functionality to collect crucial system data, screenshots, and audio recordings—all meticulously recorded in their respective log files which are then encrypted for security purposes. The key focus of our project is to harness the logging capabilities of the keylogger for positive outcomes, enabling users to access encrypted log files in the event of a system crash. This unconventional yet effective approach demonstrates the versatility of research, showcasing how a tool with potential dangers can be repurposed to enhance system diagnostics and improve overall security.

Related Content

Qais Al-Na'amneh, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Mahmoud Aljawarneh, Braa Qadoumi, Shahid Munir Shah. © 2025. 28 pages.
K. G. Anilkumar, D. Muhammad Noorul Mubarak. © 2025. 12 pages.
Tuqa Al-Makkawi, Ayoub Alsarhan, Qais Al-Na'amneh, Mohammad Aljaidi, Mohammed Amin Almaiah, Mahmoud AlJamal, Rabee Alqura'n, Mahmoud Aljawarneh. © 2025. 20 pages.
Qais Al-Na'amneh, Walid Dhifallah, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Braa Qadoumi, Ayoub Alsarhan. © 2025. 16 pages.
Brijesh Yadav, Vishal Jain. © 2025. 36 pages.
Malak Al-Majali, Mohammad Aljaidi, Qais Al-Naamneh, Ghassan Samara, Ayoub Alsarhan, Braa Qadoumi. © 2025. 14 pages.
S. Indra Priyadharshini, T. V. Padmavathy, D. Shiny Irene. © 2025. 18 pages.
Body Bottom