
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
ICCE (2025)
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 3
May-June 2025
Indexing Partners



















Keylogger – An advanced method for Computer Monitoring
Author(s) | Mr. Pranav Avinash Bhalerao, Mr. Atharva Wagaskar, Mr. Priyanshu Vadhwani, Prof. Sairabanu Pansare |
---|---|
Country | India |
Abstract | With the help of the increasing reliance on the digital systems,cybersecurity threat and such as keyloggers have evolved in to many cyber attacks and with the help of many sophisticated tools which are capable of teaching their user about privacy and data security. So we are presenting this paper for the implementation of an advanced software-based keylogger designed to operate the stealthily in a windows environment.The system we developed that captures the keystrokes, also captures the time of the keystrokes, and also captures the mouse logging and stores data locally with email-based transmission.The performance of the proposed tool is evacuated based on memory footprint,CPU usage and the detection rate through the multiple security problems. The result also indicate that the implemented keylogger demonstrates low resource usage and effective stealth behaviour, making it a potent surveillance tools.The research not only highlight the technical feasibility of building such systems but also underscores the legal responsibilities and the ethical hacking associated with cybersecurity research. Potential countermeasures and enhancements for detection are also discussed. |
Field | Computer > Network / Security |
Published In | Volume 7, Issue 3, May-June 2025 |
Published On | 2025-05-16 |
DOI | https://doi.org/10.36948/ijfmr.2025.v07i03.44884 |
Short DOI | https://doi.org/g9kfvr |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
