Browse > Article
http://dx.doi.org/10.9717/kmms.2014.17.10.1198

A Design and Implementation of a Solution for Real Detection of Information Leakage by Keylogging Attack  

Choi, In Young (Dept. of Information Security Graduate School, Young San University)
Choi, Ji Hun (Dept. of Cyber Police and Science, School of Engineering, YoungSan University)
Lee, Won Yeoul (Dept. of Cyber Police and Science, School of Engineering, YoungSan University)
Publication Information
Abstract
Most of vaccine type security solutions detect intrusion of computer virus or malicious code. However, they almost don't have functionalities of the information leakage detection. In particular, information leakage through keylogging attact cannot be detected. In this paper, we design and implement a solution to detect the leakage of information through keylogging attact. Proposed solution detects the user-specified information in real time. To detect the leakage of user-specified information, the solution extracts the payload field from each outbound packet and compares with user-specified information. We design the solution to reduce the effect on the packet transmission delay time due to packet monitoring operation. And we design a simple user interface. By proposed solution, user can response to intrusion or information leakage immediately because he or she can perceives a leakage of information in real time.
Keywords
Keylogging; Information Leakage; Security Solution; Data Matching;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 2013 Trustwave Global Security Report(2013), https://www.trustwave.com (accessed Aug, 04, 2014).
2 G.H. Kim, "Keylogging," http://blogsabo.ahnlab.com/m/post/1827 (accessed Aug, 01, 2014).
3 H.J Kim, J.H Kim, A. Lee, "Consideration from the Point of View of Personal Information Protection Trends and Detection Technology of Information Leakage," Korea Information Processing Society, Vol. 17, No. 2, pp. 52-58, 2010.
4 G.H Nam, H.S Kang, J.H Gil, and S.I Kim, "Data Loss Prevention(DLP) Technology Trends," National IT Industry Promotion Agency, Vol. 1413, pp. 1-9, 2009.
5 McAfee DLP Prevent(2013), http://www.mcafee.com/mx/resources/data-sheets/dsdlp-prevent.pdf (accessed Jul, 17, 2014).
6 Endpoint DLP/Discovery(2014), http://www.somansa.com/dlp/dlp_03.asp (accessed Jul, 20, 2014).
7 Symantec Data Loss Prevention(2014), http://www.symantec.com/ko/kr/data-loss-prevention (accessed Aug, 01, 2014).
8 K.K. Lee, Required of Information Leak Prevention Security Solution DLP , Network Times, pp. 178-182, 2012.
9 Concert Security Consumer Report(2011), http://www.concert.or.kr/Security_Consumer_Report.pdf (accessed Jul, 22, 2014).
10 E. Kim, Y.S. Lee, M.S. Jung, "Design and Implementation of anAuthentication System for Anti-Forgery using the Smart Card," Joutnal of Korea Multimedia Society Vol. 14, No. 2, pp. 249-257 Feb. 2011.   DOI