Detecting the operation of keyloggers using the dendritic cell algorithm with multiple resolutions
Вантажиться...
Файли
Дата
2025
Науковий керівник
Назва журналу
Номер ISSN
Назва тому
Видавець
Igor Sikorsky Kyiv Polytechnic Institute
Анотація
Throughout time, criminologists (or their colleagues in history) have tried to develop the most reliable methods of protecting information. Currently, the most common method of information processing is the computer, so today's information protection specialists face the task of protecting data in computers, in which the most common method of information input is data input from the keyboard by the user. Keystroke logging, also known as keylogging, consists in intercepting keystroke codes from the user. This data may contain passwords, personal correspondence, or other confidential information. Therefore, it is very important to pay attention to this method of user interaction with your "machine", because it is through this method that an attacker can steal information directly from the keyboard. Unlike traditional malware such as worms or viruses, some types of keyloggers cannot be detected by modern antivirus protection methods. The paper presents the results of a study of the application of the dendritic cell algorithm with multiple resolutions for the task of determining the presence of a keylogger in the system. Based on the simulation, a new effective model for determining the presence of a keylogger is proposed
Опис
Ключові слова
keylogger, API functions, detection, dendritic cell algorithm, multiple resolution, wavelet transform, interrupt request, DCA, HIS
Бібліографічний опис
Shybaiev, H. Detecting the operation of keyloggers using the dendritic cell algorithm with multiple resolutions / Hennadii Shybaiev, Leonid Galchynskyi // Theoretical and Applied Cybersecurity: scientific journal. – 2025. – Vol. 7, No. 2. – P. 53-63. – Bibliogr.: 18 ref.