Detecting the operation of keyloggers using the dendritic cell algorithm with multiple resolutions

Вантажиться...
Ескіз

Дата

2025

Науковий керівник

Назва журналу

Номер ISSN

Назва тому

Видавець

Igor Sikorsky Kyiv Polytechnic Institute

Анотація

Throughout time, criminologists (or their colleagues in history) have tried to develop the most reliable methods of protecting information. Currently, the most common method of information processing is the computer, so today's information protection specialists face the task of protecting data in computers, in which the most common method of information input is data input from the keyboard by the user. Keystroke logging, also known as keylogging, consists in intercepting keystroke codes from the user. This data may contain passwords, personal correspondence, or other confidential information. Therefore, it is very important to pay attention to this method of user interaction with your "machine", because it is through this method that an attacker can steal information directly from the keyboard. Unlike traditional malware such as worms or viruses, some types of keyloggers cannot be detected by modern antivirus protection methods. The paper presents the results of a study of the application of the dendritic cell algorithm with multiple resolutions for the task of determining the presence of a keylogger in the system. Based on the simulation, a new effective model for determining the presence of a keylogger is proposed

Опис

Ключові слова

keylogger, API functions, detection, dendritic cell algorithm, multiple resolution, wavelet transform, interrupt request, DCA, HIS

Бібліографічний опис

Shybaiev, H. Detecting the operation of keyloggers using the dendritic cell algorithm with multiple resolutions / Hennadii Shybaiev, Leonid Galchynskyi // Theoretical and Applied Cybersecurity: scientific journal. – 2025. – Vol. 7, No. 2. – P. 53-63. – Bibliogr.: 18 ref.

ORCID