[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tyagi et al., 2014 - Google Patents

A novel framework for password securing system from key-logger spyware

Tyagi et al., 2014

Document ID
2703398316910590926
Author
Tyagi G
Ahmad K
Doja M
Publication year
Publication venue
2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)

External Links

Snippet

Malwares are very precarious problem for Internet users. They are malicious software or programs, programmed by attackers to interrupt computer operation, gather delicate information, or gain access to client computer system. Key-logger is one of the massive …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Similar Documents

Publication Publication Date Title
Aurangzeb et al. Ransomware: a survey and trends
Biju et al. Cyber attacks and its different types
Hampton et al. Ransomware: Emergence of the cyber-extortion menace
Jesudoss et al. A survey on authentication attacks and countermeasures in a distributed environment
Peotta et al. A formal classification of internet banking attacks and vulnerabilities
Zakaria et al. The rise of ransomware
Wazid et al. A framework for detection and prevention of novel keylogger spyware attacks
Vijayalakshmi et al. Study on emerging trends in malware variants
Ruhani et al. Keylogger: The unsung hacking weapon
Kumar et al. Artificial Intelligence based Cyber Security Threats Identification in Financial Institutions Using Machine Learning Approach
Tyagi et al. A novel framework for password securing system from key-logger spyware
Mittal Software security: Threats, solutions and challenges
Sebastian et al. Framework for design of Graybot in social network
Schneider et al. Mobile devices vulnerabilities
Venkatesh et al. Identification and isolation of crypto ransomware using honeypot
McGee et al. How to counter cybercrime intrusions
Vikhe et al. Data provenance verification for secure hosts using advance cryptography algorithm
Lakshmi et al. Machine Learning based Cybersecurity Technique for Detection of Upcoming Cyber Attacks
Vishnani et al. An in-depth analysis of the epitome of online stealth: keyloggers; and their countermeasures
Zebua et al. Keylogger Threats in Computer Security Aspects
Hung et al. A QTE-based Solution to Keylogger Attacks
Kushwah Navigating the Cybersecurity Landscape: Vulnerabilities, Mitigation Strategies and Future Outlooks.
Bhatraju et al. Malware Analysis for Proactive Defence on Cyber Threat Vulnerabilities
Ramakic et al. Data protection in microcomputer systems and networks
AHMED COMPUTER CRIME