Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm

Authors
Fu Jun, Yang Huan, Liang Yiwen, Tan Chengyu
Corresponding Author
Fu Jun
Available Online November 2013.
DOI
10.2991/ccis-13.2013.122How to use a DOI?
Keywords
keylogger; keystroke simulation; dendritic cell algorithm (DCA); correlation
Abstract

Evasive software keyloggers hide their malicious behaviors to defeat run-time detection. In this paper, based on the analysis of the evasion mechanisms used by common software keyloggers, we established a framework for their detection. Mimicking user keystrokes, the framework we built could induce keyloggers showed more obvious malicious activities. These ‘amplified’ activities are then correlated by the dendritic cell algorithm (an immune-inspired algorithm) to final determine the existence of a keylogger in a host. Preliminary experimental results showed that the framework could improve the performance of keylogger detection and hard to evade.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
Series
Advances in Intelligent Systems Research
Publication Date
November 2013
ISBN
10.2991/ccis-13.2013.122
ISSN
1951-6851
DOI
10.2991/ccis-13.2013.122How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Fu Jun
AU  - Yang Huan
AU  - Liang Yiwen
AU  - Tan Chengyu
PY  - 2013/11
DA  - 2013/11
TI  - Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
BT  - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
PB  - Atlantis Press
SP  - 530
EP  - 534
SN  - 1951-6851
UR  - https://doi.org/10.2991/ccis-13.2013.122
DO  - 10.2991/ccis-13.2013.122
ID  - Jun2013/11
ER  -