Skip to main content

2018 | OriginalPaper | Buchkapitel

A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them

verfasst von : Hugo Sbai, Michael Goldsmith, Samy Meftali, Jassim Happa

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Keyloggers and screenloggers are one of the active growing threats to user’s confidentiality as they can run in user-space, easily be distributed and upload information to remote servers. They use a wide number of different techniques and may be implemented in many ways. Keyloggers and screenloggers are very largely diverted from their primary and legitimate function to be exploited for malicious purposes compromising the privacy of users, and bank customers notably. This paper presents a survey of keylogger and screenlogger attacks to increase the understanding and awareness of their threat by covering basic concepts related to bank information systems and explaining their functioning, as it presents and discusses an extensive set of plausible countermeasures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agarwal, M., Mehara, M., Pawar, R., Shah, D.: Secure authentication using dynamic virtual keyboard layout. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ISSN 2349–516, vol. 2, February 2011 Agarwal, M., Mehara, M., Pawar, R., Shah, D.: Secure authentication using dynamic virtual keyboard layout. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ISSN 2349–516, vol. 2, February 2011
2.
Zurück zum Zitat Parekh, A., Pawar, A., Munot, P., Mantri, P.: Secure authentication using anti-screenshot virtual keyboard. Int. J. Comput. Sci. Issues 8(5), 3 (2011) Parekh, A., Pawar, A., Munot, P., Mantri, P.: Secure authentication using anti-screenshot virtual keyboard. Int. J. Comput. Sci. Issues 8(5), 3 (2011)
3.
Zurück zum Zitat Abdulkader, A., Casey, M. R.: Low cost correction of OCR errors using learning in a multi-engine environment. In: 2009 10th International Conference on Document Analysis and Recognition, Barcelona, pp. 576–580 (2009) Abdulkader, A., Casey, M. R.: Low cost correction of OCR errors using learning in a multi-engine environment. In: 2009 10th International Conference on Document Analysis and Recognition, Barcelona, pp. 576–580 (2009)
4.
Zurück zum Zitat Bakhtiyari, S., Tahir, U.: Phishing attacks and solutions (2010) Bakhtiyari, S., Tahir, U.: Phishing attacks and solutions (2010)
5.
Zurück zum Zitat Cengage Learning: Malware and Social Engineering Attacks, Chap. 2 (2011) Cengage Learning: Malware and Social Engineering Attacks, Chap. 2 (2011)
6.
Zurück zum Zitat Dadkhah, M., Jazi, M.D.: Secure payment in E-commerce : deal with keyloggers and phishings. Int. J. Electron. Commun. Comput. Eng. 5(3), 656–660 (2014) Dadkhah, M., Jazi, M.D.: Secure payment in E-commerce : deal with keyloggers and phishings. Int. J. Electron. Commun. Comput. Eng. 5(3), 656–660 (2014)
8.
Zurück zum Zitat Echallier, N., Grimaud, G., et al.: Virtual keyboard logging counter-measures using common fate’s law. In: International Conference on Security and Management (SAM 2017), Las Vegas, USA, 17–20 July 2017 Echallier, N., Grimaud, G., et al.: Virtual keyboard logging counter-measures using common fate’s law. In: International Conference on Security and Management (SAM 2017), Las Vegas, USA, 17–20 July 2017
10.
Zurück zum Zitat Guerra, E.: Keyloggers: A Threat to Your Data (2011) Guerra, E.: Keyloggers: A Threat to Your Data (2011)
12.
Zurück zum Zitat Pathak, N., Pawar, A., Patil, B.: A survey on Keyloggers: a malicious Attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET), 4(4) (2015) Pathak, N., Pawar, A., Patil, B.: A survey on Keyloggers: a malicious Attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET), 4(4) (2015)
13.
Zurück zum Zitat Olzak, T.: Keystroke logging (keylogging), April 2008 Olzak, T.: Keystroke logging (keylogging), April 2008
14.
Zurück zum Zitat Lopez, W., Guerra, H., Pena, E., Barrera, E., Sayol, J.: Keyloggers - Ethical Hacking (2014) Lopez, W., Guerra, H., Pena, E., Barrera, E., Sayol, J.: Keyloggers - Ethical Hacking (2014)
15.
Zurück zum Zitat Kaur, N.: A survey on online banking system attacks and its countermeasures. IJCSNS Int. J. Comput. Sci. Netw. Secur. 15(3), 57 (2015) Kaur, N.: A survey on online banking system attacks and its countermeasures. IJCSNS Int. J. Comput. Sci. Netw. Secur. 15(3), 57 (2015)
16.
Zurück zum Zitat Ollmann, G.: The phishing guide understanding and preventing phishing attacks (2014) Ollmann, G.: The phishing guide understanding and preventing phishing attacks (2014)
17.
Zurück zum Zitat Lim, J.: Defeat spyware with anti-screen capture technology using visual persistence. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, 147–148. ACM, New York (2007) Lim, J.: Defeat spyware with anti-screen capture technology using visual persistence. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, 147–148. ACM, New York (2007)
18.
Zurück zum Zitat Roche, M.: Wireless hacking tools (2007) Roche, M.: Wireless hacking tools (2007)
19.
Zurück zum Zitat Magazine Numerique XMCO: Cybercriminalite keylogger botnet attaques (2011) Magazine Numerique XMCO: Cybercriminalite keylogger botnet attaques (2011)
20.
Zurück zum Zitat Echi, A.K., Belaid, A.: Impact of features and classifiers combinations on the performances of Arabic recognition systems. In: 2017 1st International Workshop on Arabic Script Analysis and Recognition (ASAR), pp. 85–89 (2017) Echi, A.K., Belaid, A.: Impact of features and classifiers combinations on the performances of Arabic recognition systems. In: 2017 1st International Workshop on Arabic Script Analysis and Recognition (ASAR), pp. 85–89 (2017)
21.
Zurück zum Zitat Bautista, R.M.J.S., Navata, V.J.L., Ng, A.H., Santos, M.T.S., Albao, J.D., Roxas, E.A.: Recognition of handwritten alphanumeric characters using Projection Histogram and Support Vector Machine. In: 2015 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Cebu City, pp. 1–6 (2015) Bautista, R.M.J.S., Navata, V.J.L., Ng, A.H., Santos, M.T.S., Albao, J.D., Roxas, E.A.: Recognition of handwritten alphanumeric characters using Projection Histogram and Support Vector Machine. In: 2015 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Cebu City, pp. 1–6 (2015)
22.
Zurück zum Zitat Das, T.K., Tripathy, A.K., Mishra, A.K.: Optical character recognition using artificial neural network. In: 2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, pp. 1–4 (2017) Das, T.K., Tripathy, A.K., Mishra, A.K.: Optical character recognition using artificial neural network. In: 2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, pp. 1–4 (2017)
23.
Zurück zum Zitat Kumar, B.B., Bansal, M., Verma, P.: Designing of licensed number plate recognition system using hybrid technique from neural network template matching. In: 2015 International Conference on Computing, Communication and Security (ICCCS), Pamplemousses, pp. 1–6 (2015) Kumar, B.B., Bansal, M., Verma, P.: Designing of licensed number plate recognition system using hybrid technique from neural network template matching. In: 2015 International Conference on Computing, Communication and Security (ICCCS), Pamplemousses, pp. 1–6 (2015)
25.
Zurück zum Zitat Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K.: Optical character recognition systems. In: Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K. (eds.) Optical Character Recognition Systems for Different Languages with Soft Computing. STUDFUZZ, vol. 352, pp. 9–41. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50252-6_2CrossRef Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K.: Optical character recognition systems. In: Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K. (eds.) Optical Character Recognition Systems for Different Languages with Soft Computing. STUDFUZZ, vol. 352, pp. 9–41. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-50252-6_​2CrossRef
26.
Zurück zum Zitat Bacara, C., et al.: Virtual keyboard logging counter-measures using human vision properties. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (2015) Bacara, C., et al.: Virtual keyboard logging counter-measures using human vision properties. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (2015)
27.
Zurück zum Zitat Jeng, B.S., Chang, M.W., Sun, S.W., Shih, C.H., Wu, T.M.: Optical Chinese character recognition with a hidden Markov model classifier-a novel approach. Electron. Lett. 26(18), 1530–1531 (1990)CrossRef Jeng, B.S., Chang, M.W., Sun, S.W., Shih, C.H., Wu, T.M.: Optical Chinese character recognition with a hidden Markov model classifier-a novel approach. Electron. Lett. 26(18), 1530–1531 (1990)CrossRef
28.
Zurück zum Zitat Malakar, S., Halder, S., Sarkar, R., Das, N., Basu, S., Nasipuri, M.: Text line extraction from handwritten document pages using spiral run length smearing algorithm. In: 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS), Kolkata, pp. 616–619 (2012) Malakar, S., Halder, S., Sarkar, R., Das, N., Basu, S., Nasipuri, M.: Text line extraction from handwritten document pages using spiral run length smearing algorithm. In: 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS), Kolkata, pp. 616–619 (2012)
29.
Zurück zum Zitat Yahye, A., Mohd, M., Fuad, H., Mohamed, M.A.: Survey of keylogger technologies. Int. J. Comput. Sci. Telecommun. 5, 25–31 (2014) Yahye, A., Mohd, M., Fuad, H., Mohamed, M.A.: Survey of keylogger technologies. Int. J. Comput. Sci. Telecommun. 5, 25–31 (2014)
30.
Zurück zum Zitat Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: take the rough with the smooth. Comput. Secur. 32, 102–114 (2013)CrossRef Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: take the rough with the smooth. Comput. Secur. 32, 102–114 (2013)CrossRef
31.
Zurück zum Zitat Tuli, P., Sahu, P.: System monitoring and security using keylogger. Int. J. Comput. Sci. Mob. Comput. IJCSMC 2(3), 106–111 (2013) Tuli, P., Sahu, P.: System monitoring and security using keylogger. Int. J. Comput. Sci. Mob. Comput. IJCSMC 2(3), 106–111 (2013)
32.
Zurück zum Zitat Chawla, S., Beri, M., Mudgi, R.: Image compression techniques: a review. Int. J. Comput. Sci. Mob. Comput. IJCSMC 3(8), 291–296 (2014) Chawla, S., Beri, M., Mudgi, R.: Image compression techniques: a review. Int. J. Comput. Sci. Mob. Comput. IJCSMC 3(8), 291–296 (2014)
33.
Zurück zum Zitat Sharma, P., Mahajan, R.: A review on compression techniques with run length encoding. Int. J. Appl. Innov. Eng. Manage. (IJAIEM). 2(8), (2013) Sharma, P., Mahajan, R.: A review on compression techniques with run length encoding. Int. J. Appl. Innov. Eng. Manage. (IJAIEM). 2(8), (2013)
Metadaten
Titel
A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them
verfasst von
Hugo Sbai
Michael Goldsmith
Samy Meftali
Jassim Happa
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-01689-0_2