Work place: Cyber Law and Information Security Division, Indian Institute of Information Technology, Allahabad-211012, India
E-mail: monark@iiita.ac.in
Website:
Research Interests: Pattern Recognition, Intrusion Detection System, Process Control System, Data Structures and Algorithms
Biography
Monark Bag is a Lecturer in MBA (IT) and MS (CLIS) Division of Indian Institute of Information Technology, Allahabad. He holds a B.Tech (Computer Science and Engineering), MBA (Information Technology Management) and PhD (Engineering). He is highly engaged in teaching and research. His research interest includes expert system, control chart pattern recognition, quality control, optimization techniques, intrusion detection Systems. He has published many papers in reputed journals, conferences and book chapters.
By Nairit Adhikary Rohit Shrivastava Ashwani Kumar Sunil Kumar Verma Monark Bag Vrijendra Singh
DOI: https://doi.org/10.5815/ijcnis.2012.05.02, Pub. Date: 8 Jun. 2012
The keyloggers are covert security threat to the privacy and identity of users. The attackers are exploring different techniques of keylogging using hardware keyloggers, software keyloggers and screen capturing software to steal the user sensitive data. The Incognizance of the user is imposing greater risk. To overcome this problem, we have proposed a model. In this model solution to Keylogger and Screen Recording Software has been proposed by using the concept of fabricated password on untrusted machine. It deceives the untrusted system's key logging and video capturing software. The concept used here is "WYSINT What You See Is Not True". The main feature of this model is that it has a hardware recognition to retrieve the key .This key is required by the Temporary Filter layer (TFL) as an intermediary to change into the trusted password after bypassing all the capturing techniques and returning the original password to the required website.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals