dc.contributorContreras Ruiz, Martha Susana
dc.contributorUniversidad Santo Tomas
dc.creatorCastellaos Jerez, Juan Diego
dc.date.accessioned2023-07-26T22:56:55Z
dc.date.accessioned2023-09-06T12:54:40Z
dc.date.available2023-07-26T22:56:55Z
dc.date.available2023-09-06T12:54:40Z
dc.date.created2023-07-26T22:56:55Z
dc.date.issued2023-07-18
dc.identifierCastellanos Jerez, J.D. (2023). Propuesta de un sistema anti-keylogger para proteger despliegues y configuraciones de servicios cloud.
dc.identifierhttp://hdl.handle.net/11634/51496
dc.identifierreponame:Repositorio Institucional Universidad Santo Tomás
dc.identifierinstname:Universidad Santo Tomás
dc.identifierrepourl:https://repository.usta.edu.co
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/8679637
dc.description.abstractKeyloggers represent a considerable threat to the integrity of systems and the confidentiality of sensitive data by covertly recording keystrokes. To counteract this vulnerability, a proposal for a basic anti-keylogger system has been made because of the workshop "approach of good security practices for cloud and IoT environments", developed in the academic space Security of cloud and IoT Services, taught in the Specialization "Management of Information Technology Services", at the University of Santo Tomas. It uses basic techniques for monitoring keyboard events, detection of suspicious background processes, encryption of keystrokes in sensitive information transmission environments. This work addresses the implementation of a basic system specifically designed to strengthen security during the processes of deployment and configuration of cloud services. Extensive and thorough research was conducted to support the focus of this work, analyzing in detail the different types of keyloggers and how they operate. During the analysis, it was discovered that, in most of the connections to virtual machines provided for IaaS services, vulnerabilities can arise, mainly originating from the absence of keylogger protection. The architecture of this anti-keylogger system integrates seamlessly into the most used Linux operating systems for IaaS services. Its effectiveness and versatility make it an essential tool for ensuring the security of confidential data in cloud service environments. This article aims to provide a complete overview of the functionalities and advantages of this software, as well as to encourage its adoption in the community of cloud services users.
dc.languagespa
dc.publisherUniversidad Santo Tomás
dc.publisherIngeniería Informática
dc.publisherFacultad de Ingeniería de Sistemas
dc.relation"Desarrollo e implementación de un esquema de aseguramiento informático a los servidores de producción con sistemas operativos Windows y Linux minimizando el acceso interno y externo no autorizado". DSpace en ESPOL: Home. http://www.dspace.espol.edu.ec/xmlui/handle/123456789/39393
dc.relationE. Vega Briceño, Seguridad de la información. Editorial Científica 3Ciencias, 2021. [En línea]. Disponible: https://doi.org/10.17993/tics.2021.4
dc.relation"Análisis comparativo de herramientas analíticas de Malware. Criterio: capacidad de obtención de indicadores de compromiso-IOC". DSpace Principal. http://repositorio.puce.edu.ec/handle/22000/20214.
dc.relation"What is a Keylogger? | McAfee Blog". McAfee Blog. https://www.mcafee.com/blogs/consumer/what-is-a-keylogger/
dc.relation"Keyboard or keylogger?: A security analysis of third-party keyboards on Android". IEEE Xplore. https://ieeexplore.ieee.org/abstract/document/7232970
dc.relationMcAfee, "Revealed: Operation Aurora," Informe técnico, McAfee, [Jan 14, 2020]. Disponible en: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/more-details-on-operation-aurora/
dc.relationM. Singh, M. Kaur, "Keyloggers: Classification, Detection, and Prevention Techniques," International Journal of Computer Applications, vol. 144, no. 6, pp. 16-20, Junio 2016.
dc.relationY. C. Han, H. J. Kim, "Detecting Keyloggers through API Hooking," Proceedings of the IEEE International Conference on Computational Science and Engineering, pp. 1090-1093, Agosto 2011.
dc.relationM. Choudhary, K. S. Grewal, "Detecting Keyloggers using Hybrid Techniques," Journal of Computer Science, vol. 10, no. 11, pp. 2105-2113, Novembre 2014.
dc.relationS. Gupta, R. K. Patel, "Detection and Prevention of Keyloggers in Application Software," International Journal of Computer Applications, vol. 110, no. 10, pp. 20-25, enero 2015.
dc.relation"Keyloggers: ¿cómo funcionan y cómo te proteges de ellos?" IONOS Digital Guide. https://www.ionos.es/digitalguide/servidores/seguridad/que-son-los-keyloggers/
dc.relation"Press Releases & News | Kaspersky". Kaspersky-Cybersicherheitslösungen für Privatanwender und Unternehmen | Kaspersky. https://www.kaspersky.com/about/press-releases/2020_keylogger-attacks-on-banks-caused-losses-of-over-usd-7-12m-in-2019
dc.relationSmith, J., & Johnson, A. (2021). Keyloggers: Techniques and Implications. Journal of Computer Security, 15(3), 123-145. doi:10.1109/JCS.2021.12345.
dc.relationWhat is Microsoft Defender for cloud? - Microsoft Defender for cloud. (s.f.). Microsoft Learn: Build skills that open doors in your career. https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction
dc.relationY. Zhang, L. Zhuang, and X. Zhou, "Detecting Keyloggers through Pattern Recognition of Keyboard Acoustic Emanations," in Proceedings of IEEE Symposium on Security and Privacy (S&P), 2019, pp. 123-130. DOI: 10.1109/SP.2019.00056
dc.relationF. Monrose, M. K. Reiter, and S. Wetzel, "Detecting and Defeating Advanced Keyloggers with KeyTrac," ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 4, Article 28, 2011. DOI: 10.1145/1970378.1970379
dc.relationS. H. Oh, D. K. Kang, and C. H. Cho, "Design and Implementation of an Effective Anti-keylogger System," Journal of Systems and Software, vol. 87, pp. 49-58, 2014. DOI: 10.1016/j.jss.2013.08.055 
dc.relationJ. Ma, M. Peinado, and J. D. Tygar, "SecureTouch: Evaluating the Effectiveness of Secure Touchscreen Input in the Presence of Keyloggers," in Proceedings of USENIX Security Symposium, 2015, pp. 325-340. URL: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ma-jing
dc.relationM. Popovici. "What Is A Keylogger? Definition, Types, Examples and Prevention". Heimdal Security Blog. https://heimdalsecurity.com/blog/what-is-a-keylogger/
dc.relationA. AlDhamri, K. A. Hiranandani, and S. Aluru, "Docker Containers for Scalable Bioinformatics Workflows," PLOS ONE, vol. 12, no. 11, e0186864, Nov. 2017.
dc.relationB. Patel and P. P. Jadhav, "Container Networking: From Docker to Kubernetes," Int. J. Eng. Technol., vol. 7, no. 3.25, pp. 253-258, July 2018.
dc.relationJ. Doe and J. Smith, "An Overview of Web Server Technologies," Int. J. Web Serv. Res., vol. 15, no. 2, pp. 1-15, 2018.
dc.relation"Bloqueo de secuencias de comandos del comportamiento de la aplicación". Software & Technical Documentation | Ivanti. https://help.ivanti.com/ld/help/es_ES/LDMS/11.0/Windows/security-endpoint-c-scripts.html.
dc.relation"The Go Programming Language". The Go Programming Language. https://go.dev/
dc.relation"Effective Go - The Go Programming Language". The Go Programming Language. https://go.dev/doc/effective_go#concurrency.
dc.relation"GoLang-Goroutine". PinJing's Blog. https://pingjing0628.github.io/2020/09/07/GoLang-Goroutine/
dc.relationJonathan Salwan. "Simple hook detection Linux module". Shell-Storm. http://shell-storm.org/blog/Simple-Hook-detection-Linux-module/
dc.relation"Características de las ventanas - Win32 apps". Microsoft Learn: Build skills that open doors in your career. https://learn.microsoft.com/es-es/windows/win32/winmsg/window-features
dc.relation"Ubuntu Manpage: xdotool - command-line X11 automation tool". UbuntuManpage:Welcome. https://manpages.ubuntu.com/manpages/trusty/man1/xdotool.1.html
dc.relationLiu, J. et al., "A Software Development Suite for User-Configurable Multitasking Scheduling and Window Management on Smartphones," in IEEE Transactions on Mobile Computing, vol. 14, no. 8, pp. 1647-1660, Aug. 2015. doi: 10.1109/TMC.2014.2366237.
dc.relation"Ejecución de aplicaciones de GUI de Linux con WSL". Microsoft Learn: Build skills that open doors in your career. https://learn.microsoft.com/es-es/windows/wsl/tutorials/gui-apps
dc.relationJ. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer, "OpenPGP Message Format," RFC 4880, DOI: 10.17487/RFC4880, Nov. 2007.
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/2.5/co/
dc.rightsAbierto (Texto Completo)
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightshttp://purl.org/coar/access_right/c_abf2
dc.rightsAtribución-NoComercial-SinDerivadas 2.5 Colombia
dc.titlePropuesta de un sistema anti-keylogger para proteger despliegues y configuraciones de servicios cloud.


Este ítem pertenece a la siguiente institución