Detecting the operation of keyloggers using the dendritic cell algorithm with multiple resolutions
DOI:
https://doi.org/10.20535/tacs.2664-29132025.2.337840Abstract
Throughout time, criminologists (or their colleagues in history) have tried to develop the most reliable methods of protecting information. Currently, the most common method of information processing is the computer, so today's information protection specialists face the task of protecting data in computers, in which the most common method of information input is data input from the keyboard by the user. Keystroke logging, also known as keylogging, consists in intercepting keystroke codes from the user. This data may contain passwords, personal correspondence, or other confidential information. Therefore, it is very important to pay attention to this method of user interaction with your "machine", because it is through this method that an attacker can steal information directly from the keyboard. Unlike traditional malware such as worms or viruses, some types of keyloggers cannot be detected by modern antivirus protection methods.
The paper presents the results of a study of the application of the dendritic cell algorithm with multiple resolutions for the task of determining the presence of a keylogger in the system. Based on the simulation, a new effective model for determining the presence of a keylogger is proposed.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).