0% found this document useful (0 votes)
4 views20 pages

Batch 23

The document presents a mini project on developing a key capture system using natural language processing and Python's pynput module. It discusses the importance of data security and the dual nature of key capture technology, which can be used for both legitimate monitoring and malicious purposes. The project aims to create an efficient software-based keylogger that captures keystrokes while addressing ethical and security considerations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views20 pages

Batch 23

The document presents a mini project on developing a key capture system using natural language processing and Python's pynput module. It discusses the importance of data security and the dual nature of key capture technology, which can be used for both legitimate monitoring and malicious purposes. The project aims to create an efficient software-based keylogger that captures keystrokes while addressing ethical and security considerations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

DEPARTMENT OF INFORMATION TECHNOLOGY

A
MINI PROJECT ON

SYSTEM SCRUTINIZER USING NATURAL LANGUAGE


PROCESSING
Presented By :
R Arun (21N31A12F5) Under the Guidance of,
T Uday Ajay Sai (21N31A12H8) Mrs. M.AISHWARYA
Assistant Professor,
Y Shanmukha (22N35A1220) Department of IT.
U Siri Chandana (21N31A12H9)
CONTENTS
• Abstract
• Introduction
• System Architecture
• UML Diagrams
• Result
• Conclusion
• References
ABSTRACT

• In many companies now-a-days data security and data recovery is the most
important factor. So there are many cases where data recovery is required. For
these kinds of problems key capture is one of the best solutions which is often
referred to as key capturing or keyboard capturing.

• Keyboard capturing is the action of recording the keys stroke on a keyboard,


typically covertly, so that the person using the keyboard is unaware that their
actions are being monitored. Most of the people tend to see only bad side of
this particular software but it also has legitimate use.

• Aside from being utilized for vindictive purpose like gathering account data,
Visa numbers, client names, passwords, and other private information, it can
be used in office to check on your employees, at home to monitor your
children’s activities. The software that we are going to build should monitor
the keyboard movement and stores the output in a file.
INTRODUCTION

 Key capture is a kind of malware that has capability to maliciously track


input of the user from the keyboard in aim to retrieve private information.
The keyboard is the prime target as it allows key captures to retrieve user
input to the system as it is the most common way user interacts with a
computer.
 There are two types of key captures that exists in market, a software key
capture and a hardware key capture among which software key capture are
widely used and are easy to plant and cause substantial damage.
 Key capture can be used for legitimate as well as illegitimate purposes, it
basically depends on user who is using it. System administrators can use key
captures for systems, i.e. for detecting suspicious users.
 Key captures essentially performs two tasks that is guiding into client input
stream to get keystrokes and moving the information to a distant area (for
example-text document).
 Key captures can effectively assist a computer forensics analyst in the
examination of digital media. Key capture to gain this information and cause
threat to the organisation.
 Keystroke captures can be used to capture and compile a record of all typed
keys. Key captures can at times be utilised as a spying instrument to bargain
business and an organisation 's information.
 System Scrutinizer on mobile phones can optimize performance by monitoring
resource usage, enhance security by detecting anomalies or malicious activities,
and empower users with data privacy controls through app permission auditing
and data usage tracking.
 This project offers a holistic approach to system analysis, encompassing not only
performance evaluation but also risk assessment and security enhancement.
Through meticulous examination, it endeavors to fortify the organizational
infrastructure against potential threats and ensure seamless operation.
EXISTING SYSTEM

 Hardware Key Capture Stand-alone Edition: A tiny hardware device that can be
attached in between a keyboard and a compute
 Hardware Key Capture Keyboard Edition: looks and behaves exactly like a
normal keyboard, but it keeps a record of all keystrokes typed on it.
 Key Ghost Hardware Key Capture: A tiny hardware device that can be attached
in between a keyboard and a computer.
 KeyKatcher Keystroke Capture: A tiny hardware device that can be attached in
between a keyboard and a computer.
PROPOSED SYSTEM

The basic idea of the project is to create a key capture using python.
 We will be using a module which is named as pynput module which we have
installed in our system.
 The file has some malicious attributes which can enable access to our keyboard
and make a copy of the keys which we are pressing.
 It actually catches the press and release of a key and its time so that it can know
how many times is that key pressed.
 The keys presses are stored as a log file which is basically a text document.
 The administrator can have access to the file whenever he wants.
 The program stops if an “esc” key is pressed.
The solution is that we can build a software keycaptures instead of hardware
keycaptures. The proposed model provides the solution that reduces the
difficulties while installing the keycaptures in target system and this cannot be
detected easily. Since, software keycaptures can be installed remotely and does
not need any physical access of the target system. Proposed software key
capture is efficient enough to get installed in targeted system by itself when the
user for example clicks the malicious link sent to him through mail or any
social media and finally captures all the keystrokes of the user while he is
logged into the system, saves the logs in a file and the third party can easily
have access to the file.
SYSTEM ARCHITECTURE
Functional Requirements

 Key Stroke: The keylogger must accurately capture all keystrokes entered by the user.
 Timestamp Logging: Each keystroke must be logged with an accurate timestamp.
 Log file Management: Captured keystrokes should be stored in log files.
 Data Encryption: Log files containing keystroke data must be encrypted.
 Real-Time Data Transmission: The keylogger should support the automatic real time files.
 User Privacy : The keylogger must include features that ensure ethical use, including activites.
 Stop Mechanism: The keylogger should include a feature to stop its operation.
Non Functional Requirements

 Performance: The keylogger must operate efficiently with minimal impact on system
performance.
 Scalability: The keylogger should be scalable to handle different volumes.
 Security: The system must implement robust security measures, including secure data
storage,
 Usability: Provide an intuitive and user-friendly interface for all user types.
 Availability: Maintain high system availability with minimal downtime.
 Reliability: The keylogger must operate stealthily, avoiding detection by antivirus
programs.
 Backup and Recovery: Implement robust procedures to protect data integrity and
ensure service continuity.
UML DIAGRAMS

Use Case diagram


Class diagram
Sequence Diagram
Activity Diagram
INPUT
OUTPUT
CONCLUSION
 The development of a keylogger using Python and the pynput module demonstrates the effectiveness and
versatility of software-based key capture systems. By leveraging Python’s capabilities, the keylogger can be
designed to operate discreetly, accurately capturing and logging keystrokes while maintaining a minimal
system footprint.

 The project highlights the importance of incorporating robust security measures, such as encryption, to
protect the logged data from unauthorized access, ensuring that the keylogger can be used responsibly and
ethically. The keylogger’s ability to be deployed remotely and operate across multiple platforms makes it a
powerful tool for legitimate purposes, such as monitoring authorized users in corporate environments or for
cybersecurity research.

 However, it also underscores the need for careful consideration of ethical and legal implications, as misuse
could lead to significant consequences. Despite the technical sophistication of the project, it also highlights
important ethical considerations. Keyloggers, while useful in legitimate scenarios, can easily be misused for
malicious purposes.
REFERENCES
[1].System Scrutinizer a Key Component in Next-Gen Operating Systems: White,
E. (2023).
[2].G.Karagiannis,M.Saeed,P.Papotti.Scrutinizer:https://github.com/
geokaragiannis/2020.
[3]. A Reference-Based System for Scrutinizing Cyber-Physical Systems by M. A.
Akbar et al., published in IEEE Access, vol. 6, pp. 4811-4823, Dec. 2017.

You might also like