Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data

Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data

International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-3, January 2020 Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data Disha H. Parekh, Nehal Adhvaryu, Vishal Dahiya Though cyberwarfare usually refers to cyber-attacks Abstract: Cyberwarfare is observed very frequently as always committed by one nation on another, it can also portray some or the other country is targeting to ruin its enemy country by attacks by terrorist groups or hacker groups intended at hacking confidential data from vital computer systems. This has furthering the goals of particular nations. Avoiding such led to dangerous international conflicts. Hence, to avoid illicit entry of other than military person or a government official forgery attacks and stop cyber stalking, keyloggers work as several tools are being used today as spyware. Keyloggers are one tool that can help in spying the intruders. of the prominent tools which are used in today’s world to obtain Keylogger is a hardware or software plugin which secret or confidential data of a legitimate and contradictory a secretly captures all the keystrokes entered through the malicious user too. These keyloggers are advantageous and taken up positively for monitoring employee productivity, for law keypad of a typing device, without the consent of user. It can enforcement and the search for evidence of the crime. While it’s affect a desktop or laptop keyboard as well as keypad of negative illegitimate use includes data theft and passwords. The smart-devices. The keystrokes get recorded in the form of keylogger is today witnessed as a malicious attack and is looked logs and hence this process is called keylogging, while the upon as a security threat. But every coin has two sides. Keylogger tool or the device is called as a keylogger [1]. actually helps in avoiding several security breaches and also aids in detecting several crimes across the net world followed by other The logs are stored in the device and then are sent to the fellow countries. This fact has motivated to write this paper and as receiver via email or some other method as set by the a consequence, an experimental analysis too was carried out in intruder. In fact this type of spying technique can be applied order to conclude that keyloggers’ log file helps identify the person to gain positive and negative, both the outcomes. The choice by analyzing proper pattern of the words entered in the file. This paper focuses majorly on the aspect of natural language of using it in either of the way is purely dependent on the processing, where a log file obtained thru keylogger software is user’s intention. thoroughly processed via the algorithm as described in the paper. There are two types of keyloggers: The results yielded a fair understanding of the results obtained as one can easily identify the words used and on the basis of that can Hardware Keyloggers: They are tiny devices fit as an also know the type of person on the other end with his ideas, add-on in the computer system to capture and detect the malicious one or of a legal kind. keystrokes. These type of keyloggers are attached in the wifi router, under keyboard or behind the CPU to capture the Keywords : Keyloggers, Spyware, Cyberwarfare, Cyberwar keystrokes. Nowadays, even optical keyloggers, for wireless devices, are observed that captures keystroke through I. INTRODUCTION electromagnetic fields. Cyberwarfare refers the exploiting of digital attacks Software Keyloggers: Any non-physical technique used for capturing the keystrokes is called a software keylogger such as computer viruses, hacking or intruding and malicious and is more destructive than hardware keylogger. These attacks by one country to disrupt the imperative computer keystroke loggers can be installed in the Operating system, systems of another, with the intention of creating harm, root directory, virtual machines as well as web-forms or any decease and demolition. Future wars will see malicious users web-scripts [2]. using computer code to attack an opponent’s infrastructure, The paper is divided into several sections. The second combating alongside troops using predictable weapons like section consists of papers reviewed to collect the basis of this guns and missiles. paper and the basics of keyloggers. Section three consists of A vague world that is filled with spies, hackers and top methodology that is used in this paper combining keylogger clandestine digital arms projects, cyberwarfare as software and python scripts. Fourth section shows the increasingly common and dangerous trait of global conflicts. algorithmic evaluation of the stages involved in methodology. Fifth section shows the implementation and Revised Manuscript Received on January 5, 2020 the results obtained thru an online tokenizer. While sixth * Correspondence Author Disha H. Parekh*, Department of Computer Science, Indus University, shows the analysis carried out for the same. Seventh section Ahmedabad, Gujarat, India. Email: [email protected] is very important that shows the results of the experiment Nehal Adhvaryu, assistant professor, computer science, Indus carried out than by a coding in python and using Anaconda University, Ahmedabad. [email protected]. Dr. Vishal Dahiya, Head of Department, Department of Computer Navigator for the result Science Indus University, Ahmedabad, Gujarat India. Email: analysis and evaluation. Eighth [email protected]. section shows the conclusion Published By: Retrieval Number: C8817019320/2020©BEIESP Blue Eyes Intelligence Engineering DOI: 10.35940/ijitee.C8817.019320 2028 & Sciences Publication Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data of the paper. obtain confidential user information. As such, commercial software versions are often used by parents, spouses or II. BACKGROUND corporations to monitor an unsuspecting user. There are various types of keyloggers found in present day. As mentioned in the introduction, a keylogger is a All the types of keystroke loggers are divided into major two hardware device or software program that records real time types as mentioned in introduction. A diagrammatic activities of a computer user. It can be programmed to store representation of the types has been shown in the Figure1. the captured data locally or remotely. It may record all The explanation of each type is beyond the objective of this keystrokes or may be sophisticated enough to monitor paper. specific activity-like opening a web browser pointing to your online banking site. Such software can be used maliciously to Fig 1: Types of KeyLoggers authenticity [5]. Various research studies have examined the current state III. METHODOLOGY of keyloggers and how they can play an invaluable role in This paper proposes a very novel idea of using keyloggers cyber-security. Some university projects have provided very as a source to identify the person or a user that uses vital interesting data: computers like government computers, or may be server or University of Caen (France): combined keystroke some highly confidential system of any organization. dynamics and 2D face recognition/biometric fusion methods This method is divided into few steps which are carried out for purposes of identification and authentication [3]. sequentially only after a log file is obtained via some software keylogger. Our carried out experiment is shown in Stanford University: developed a framework called the next section. Here we propose a method to combine “Telling Human and BOT Apart” a remote biometric system keylogger functionality with a recent area of focus today in based on keystroke dynamics-designed to fight against the world of research, i.e. Data Science. In this area, there is spoofing attacks which permits botnets to match a user’s one budding branch under Artificial Intelligence, called as keystroke sequences [4]. Natural Language Processing, in short described as NLP. It deals with analyzing, understanding and generating the While there is a paper on analyzing the Biometric Systems languages that humans use for Authentication which shows various methods of attempts naturally in order to interface to compromise ones identity and thus allow the user’s with computers in both written Published By: Retrieval Number: C8817019320/2020©BEIESP Blue Eyes Intelligence Engineering DOI: 10.35940/ijitee.C8817.019320 2029 & Sciences Publication International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-3, January 2020 and spoken contexts using natural human languages instead will be carried out in following manner [6]. of computer languages. Import word_net_lemmatizer() The procedure used after a log file is obtained through keylogger is distributed in steps mentioned in lemmatizer = word_net_lemmatizer() implementation part with its pseudo-code. str tokenize (keylogger_log_file) for word instr IV. ALGORITHM EVALUATION print(lemmatizer.lemmatize(word)) The implementation part here in the paper mentions the methodology portion. Here, we have shown the pseudo-code 4. Named Entity Recognition: This is going to be the in sequential order, which needs to be perform exactly with last step which will aim in finding the named entities the same steps. in text and classify it into pre-defined categories like name of person, location, organization, timestamp, 1. Obtain a log file: At the very first instance, a log file title, etc. To carry out

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us