Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
Authors
Fu Jun, Yang Huan, Liang Yiwen, Tan Chengyu
Corresponding Author
Fu Jun
Available Online November 2013.
- DOI
- 10.2991/ccis-13.2013.122How to use a DOI?
- Keywords
- keylogger; keystroke simulation; dendritic cell algorithm (DCA); correlation
- Abstract
Evasive software keyloggers hide their malicious behaviors to defeat run-time detection. In this paper, based on the analysis of the evasion mechanisms used by common software keyloggers, we established a framework for their detection. Mimicking user keystrokes, the framework we built could induce keyloggers showed more obvious malicious activities. These ‘amplified’ activities are then correlated by the dendritic cell algorithm (an immune-inspired algorithm) to final determine the existence of a keylogger in a host. Preliminary experimental results showed that the framework could improve the performance of keylogger detection and hard to evade.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Fu Jun AU - Yang Huan AU - Liang Yiwen AU - Tan Chengyu PY - 2013/11 DA - 2013/11 TI - Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm BT - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security PB - Atlantis Press SP - 530 EP - 534 SN - 1951-6851 UR - https://doi.org/10.2991/ccis-13.2013.122 DO - 10.2991/ccis-13.2013.122 ID - Jun2013/11 ER -