0% found this document useful (0 votes)
21 views

Keylogger Capturing

The document details a student's IBM internship project on developing a keylogger. It provides information on the student, project overview, agenda, end users, customizations made, modeling process, results and links.

Uploaded by

Nikita Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Keylogger Capturing

The document details a student's IBM internship project on developing a keylogger. It provides information on the student, project overview, agenda, end users, customizations made, modeling process, results and links.

Uploaded by

Nikita Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Name:nikita chauhan

STUDENT Email-id:[email protected]
DETAILS: College:Roorkee college of engineering
IBM
SKILLBUILD State:Uttrakhand
INTERNSHIP Student ID:STU6422ecc0f00a71680010432
Internship id:INTERNSHIP_168198413964410a8bb547b1
Internship duration:12-06-2023/24-06-2023(6 weeks)
Ph.no:8077016677
Whatsapp no:7599575005
 Introduction
 project topic
 agenda
 project overview
 who are the end users
 solution and its value
proposition
 how did you customize
the project and make it
own
 modelling
 result
 links
Keylogger
capturing key
strokes
we will explore the various aspects of our
project in detail. We will begin by discussing
the key features of our solution and how it
adds value to our end-users. Next, we will
AGENDA: delve into the modeling process and
showcase the results we have achieved so
far.
The project I am presenting today is a comprehensive
analysis of keyloggers, their uses, and the potential
risks they pose to individuals and organizations.i was
spent months researching and uderstanding with
various types of keyloggers to gain a thorough
understanding of how they work and how they can be

PROJECT
detected and prevented.

OVERVIEW:
I will delve into the technical aspects of keyloggers,
including their modes of operation, the types of
information they can capture, and the methods used
to transmit that information to unauthorized
partiesor users.
WHO ARE END USERS:

The end users of our keylogger


Our keylogger solution Capture
project are individuals and
keystrokes, monitor internet
organizations who want to
activity, and track application
monitor computer activity for
usage. With this information, they
security or productivity reasons.
can identify potential security
This includes parents who want to
threats, detect unauthorized
keep an eye on their children's
access, or improve employee
online behavior, employers who
productivity. By providing a
want to ensure that employees
customizable and easy-to-use
are using company resources
interface, we make it simple for
appropriately, and law
end users to access the data they
enforcement agencies who need
need to make informed decisions.
to track criminal activity.
My solution to combat keyloggers is a
SOLUTION AND sophisticated algorithm that analyzes
keystroke patterns and detects any
ITS VALUE abnormal activity. By identifying potential
threats in real-time, our software provides
PROPOSITION : users with the peace of mind they need to
browse the internet without fear of being
monitored.
HOW DID YOU CUSTOMIZE THE
PROJECT AND MAKE ITS OWN:

I also added a user-friendly interface


To truly make this project my own, I
that allows users to easily customize
had to go beyond the basic
their logging preferences and view
functionality of a typical keylogger. I
logs in an organized manner. These
customized the code to include
enhancements not only improve the
advanced features that cater to the
overall user experience but also
needs of modern users.
make the tool more effective
• Our keylogger model is based on the
latest advancements in machine learning
algorithms and cyber security techniques.
We have trained our model on a vast
dataset of real-world keylogging attacks
to ensure its accuracy and effectiveness.
• The model uses advanced anomaly
MODELLING: detection techniques to identify
suspicious behavior and alert users in
real-time. It also has the ability to adapt
and learn from new patterns, making it a
powerful tool for detecting and
preventing cyber attacks.
RESULT:

Our solution not only provides


After rigorous testing and research, I
increased protection against cyber
am proud to present the results of
attacks, but also offers a user-
our project. Through my research,
friendly interface that prioritizes
we were able to identify several key
ease of use. i believe this
vulnerabilities in existing keylogger
combination of security and
project and create a more secure
accessibility sets our product apart
alternative.
from the competition.
LINKS:
• https://github.com/nikita123Chauhan/project.git
• https://www.geeksforgeeks.org/design-a-keylogg
er-in-python
• https://www.techtarget.com/searchsecurity/defin
ition/keylogger
• https://www.veracode.com/security/keylogger
• http://bit.py/2KRPqfy

You might also like