Abstract: A keylogger is a type of software or hardware device that enables the recording of all keystrokes made on a computer or mobile device keyboard. Essentially, it allows for the monitoring and tracking of user activity, which can be used for security and surveillance purposes. Keyloggers have both legitimate and illegitimate uses. For example, some organizations use them to monitor employee activity, while others use them to steal sensitive information such as login credentials, credit card numbers, and other personal data. Unfortunately, keyloggers can be used for malicious purposes, as well, which means they can pose a significant security risk to individuals and organizations alike. One of the primary challenges with keyloggers is their ability to operate surreptitiously. They are designed to work in the background, without drawing any attention to themselves, and typically do not exhibit any visible signs of their presence. As a result, they can be challenging to detect and remove from an infected system.
Keywords: Keylogger, hooking, signature-based, malware rootkits, anomaly based, OS, API.
| DOI: 10.17148/IJARCCE.2023.12336