Vous êtes sur la page 1sur 20

Contents

Contents................................................................................................................ 1
1.Project Specification ..........................................................................................3
1.1 Project Statement ........................................................................................3
1.2 Proposed work..............................................................................................3
1.3 Need of Project.............................................................................................3
1.4 Scope of the project......................................................................................3
2. Project Objectives..............................................................................................4
2.1 Project objective...........................................................................................4
2.2 Overview...................................................................................................... 4
3. Information Gathering.......................................................................................4
3.1 Introduction :................................................................................................4
3.2 Problem definition:.......................................................................................4
3.3 Literature survey:.........................................................................................5
3.4 Current Scenario:.........................................................................................5
4. Requirement Analysis........................................................................................5
4.1 Introduction.................................................................................................. 5
4.1.1 Purpose.................................................................................................. 5
4.1.2 Scope......................................................................................................6
4.1.3 References............................................................................................. 6
4.2 Overall Description.......................................................................................6
4.2.1 Product Prespective...................................................................................6
4.3 Software System Attributes..........................................................................7
4.3.1 Reliability:...............................................................................................7
4.3.2 Availability:................................................................................................8
4.3.3 Maintainability:.......................................................................................8
4.3.4 Portability:..............................................................................................8
4.3.5 Platform-Independence..........................................................................8
4.3.6 Multithreading programming..................................................................8
4.3.7 Security.................................................................................................. 8
4.4 Product Features..........................................................................................9
4.4.1 Stroke Recording....................................................................................9
4.4.2 Record Clipboard Activity.......................................................................9
4.4.3 Screen-Shot Monitoring (Visual Surveillance).........................................9
4.4.4 Log Viewer..............................................................................................9

1
4.4.5 Upload Log by e-Mail..............................................................................9
4.4.6 Upload Log by LAN...............................................................................10
4.4.7 Report Generation................................................................................10
4.4.8 Viewing Backup Activities.....................................................................10
4.4.11 Advance View Option ........................................................................10
4.4.12 Recording Multiple User account & Filtering.......................................10
4.4.13 Password Protection...........................................................................10
Our Keylogger has password protection to prevent others from changing
your configurations or viewing the log files. After configuring and starting the
program, you can activate All In One Keylogger simply by typing your
password, and it doesn't matter in what application you are working with.
Just type the password and our Keylogger will be right there.......................10
4.4.14 Privacy Features.................................................................................10
4.4.15 Disable Anti-Keylogger Softwares.......................................................11
4.4.16 Disable Unwanted Softwares.............................................................11
4.4.17 Block Unwanted URLs.........................................................................11
4.4.18 Filter application monitoring...............................................................11
4.4.19Multilanguage - Localized Keylogger...................................................11
5. System Analysis...............................................................................................12
5.1 Feasibility study report...............................................................................12
5.1.1 Operational Feasibility:.........................................................................12
5.1.2 Technical feasibility:.............................................................................12
5.1.3 Cost Feasibility:....................................................................................12
5.2 Project Estimating:......................................................................................12
6. System Design.................................................................................................13
6.1 High Level Design.......................................................................................13
6.1.1 Data Flow Diagram:.................................................................................13
6.2 Low Level Design........................................................................................13
6.2.1 UML Diagrams:.....................................................................................13
6.2.1.1Use Case Diagram..............................................................................14
6.2.1.2 Sequence Diagram............................................................................15
6.2.1.3 Activity Diagram................................................................................17
6.2.1.4 Collaboration Diagram.......................................................................18
6.2.1.5 Class Diagram...................................................................................18
7. Conclusion....................................................................................................... 19
8.References........................................................................................................19
8.1 Books Refered............................................................................................19

2
Web-sites Referred...........................................................................................19
IEEE papers Referred........................................................................................19

1.Project Specification

1.1 Project Statement

Implementation of keylogger software for tracing user activities.

1.2 Proposed work

In our project we are developing a software which will help owner of pc to trace the
user activities. This Software will log all keystrokes pressed by the user into text file
and also take screenshots when cpu usage goes high or on mouse clicks . This log file
and screenshots will be mailed to the owner of the pc after some interval of time if the
internet connection is available otherwise if pc is connected in lan then it will be send
to the administrator. Log files and screenshots will remain hidden from the user and
After sending log files and screenshots to the owner log files will be deleted from pc.
Using java programming we can create such applications which will help us to trace
the user activites. It is not visible to the user so that he/she is unaware from this
software so this will defiantly helpful to trace the user activities.

1.3 Need of Project


1
2 This project will help the concerned parents to trace the activities of their childerns.
Also it will help the various organizations to trace the activities of suspicious
employee. It will help Law enforcement or private investigators looking for evidence
of an ongoing crime or inappropriate behavior. We here through our project develop
such kind of application named as “Keylogger.”

1.4 Scope of the project

The keylogger software we are developing can trace all the activites of the users.The
software will log all the keystrokes pressed by user into text file and this text file will
have extensions like .log or .axt so that no one can read it easily. Software will take
screenshots when cpu usage goes high or on mouse clicks. This log file and
screenshots will be mailed to the owner of the pc after some interval of time if the
internet connection is available otherwise if pc is connected in lan then it will be send

3
to the administrator. Log files and screenshots will remain hidden from the user and
after sending log files and screenshots to the owner log files will be deleted from pc.
The whole software will work on the background and it is not possible to view the
software in task manager, program files or start up menu.

2. Project Objectives
2.1 Project objective

The main objective behind this project is to help the owner of the computer system to track
the all activities that are done by the user in his absence. This software will help employers to
ensure that employees will use work computers for business use only. Software will help the
concerned parents to find what activities their childrens are doing in their absence. Software
will help the Law enforcement or private investigators looking for evidence of an ongoing
crime or inappropriate behavior.

2.2 Overview

Key logger invisibly records keystrokes of every user activity performed on the computer in
log files all typed emails conversations, chat records, website visited, password and
documents lists. Its folders are hidden from all users in your system they do not appear in file
search and will not be found by file managing shells. Not only program modules of Key
logger are hidden, but the logs stay unrevealed as well. Key logger will not be visible in
Tasks or Processes List, among installed programs and in Start menu (unless you prefer a
visible installation). Key logger will not show up in registry or Add/Remove Programs
utility.Keylogger will also take the screenshots when cpu usage goes high and store them in
pc.the screenshots will also be remained hidden from user.log files and screenshots are send
to the owner of system after some interval of time and these files will then deleted if the mail
transfer is successfull.

3. Information Gathering
3.1 Introduction :

Initial phase of our project is to gather basic information about keyloggers such as what is
keyloggers ? What are the Features of Keyloggers? How to capture keystrokes and how to
hide the log files.

3.2 Problem definition:

4
Keylogger is a software program that is used to monitor and log each of the keys a user types
into a computer keyboard. The user who installed the program can then view all keys typed in
by that user. Software will take screenshots when cpu usage goes high or on mouse clicks.
This application will send a log file and screenshots to the owner of keylogger through mail
or if pc is connected in lan it will send it to the administrator through FTP connection. The
project aims at developing an application using Java Technology. The project is for
companies or practical labs to trace the activities of suspicious employee also for concerned
parents to trace their childerens activites on computers.

3.3 Literature survey:

We referred various IEEE papers like


[1] ‘ Keyloggers Increasing Threats to Computer Security and and Privacy” by seref
sagiroglu and gurol canbek.
[2] G. Canbek, “Analysis, design and implementation of keyloggers and anti-keyloggers,”
Gazi University, Institute Of Science And Technology, M.Sc. thesis (in Turkish), Sept. 2005,
pp. 103.
[3] J. Wurtzel, “Bugging your keyboard,” BBC News, Science/Nature;
http://news.bbc.co.uk/1/hi/sci/tech/1638795.stm, accessed Sept. 2006.[4]. J. Williams, “I
know what you did last logon: Monitoring software, spyware, and privacy,” Microsoft
Security News., vol. 4, no. 6, June 2007.

We got information for project from the websites like www.keyloggers.org


3.4 Current Scenario:

Currently available keylogger softwares in market are not platform independant they are all
designed by keeping particular operating system in mind but our keylogger software will run
on any operating system as it is platform independant. Portability of java language helps us
to make our keylogger operating system independant.

4. Requirement Analysis
4.1 Introduction

We are developing the software that will trace the user activities. It will log all keystrokes
pressed by user into text file and also takes the screenshots when cpu usage goes high. The
text files and screenshots will be remained hidden from the user . Screenshots and loggfiles
will be mailed to the pc owner after frequent interval of time and after this log files and
screenshots will be deleted. This software is not visible in the program files or task manager
and run in background so that He/She will be not aware of the keyolgger softaware.

4.1.1 Purpose

5
Purpose of our project is to develop a software which will help the owner of software to
track the all activities that user had done in his absence. Our purpose is to help the
companies or organizations to track the employes activitys on computer and also for
concerned parents to track the activitys of their childrens in their absence.This Software will
help the Law enforcement or private investigators looking for evidence of an ongoing crime
or inappropriate behavior.

4.1.2 Scope

The keylogger software we are developing can trace all the activites of the users.The software
will log all the keystrokes pressed by user into text file and this text file will have extensions
like .log or .axt so that no one can read it easily. Software will take screenshots when cpu
usage goes high or on mouse clicks. This log file and screenshots will be mailed to the owner
of the pc after some interval of time if the internet connection is available otherwise if pc is
connected in lan then it will be send to the administrator. Log files and screenshots will
remain hidden from the user and after sending log files and screenshots to the owner log files
will be deleted from pc. The whole software will work on the background and it is not
possible to view the software in task manager, program files or start up menu.

4.1.3 References

We referred various IEEE papers like


[1] ‘ Keyloggers Increasing Threats to Computer Security and and Privacy” by seref
sagiroglu and gurol canbek.
[2] G. Canbek, “Analysis, design and implementation of keyloggers and anti-
keyloggers,” Gazi University, Institute Of Science And Technology, M.Sc. thesis (in
Turkish), Sept. 2005, pp. 103.
[3] J. Wurtzel, “Bugging your keyboard,” BBC News, Science/Nature;
http://news.bbc.co.uk/1/hi/sci/tech/1638795.stm, accessed Sept. 2006
.[4]. J. Williams, “I know what you did last logon: Monitoring software, spyware, and
privacy,” Microsoft Security News., vol. 4, no. 6, June 2007.

4.2 Overall Description


4.2.1 Product Prespective
4.2.1.1 Software requirement

The software requirements for our Project are as follows:

6
Operating System
This software will run on any operating system it will not require any specific operating
system. As this is operating system independant it can run on any windows versions,linux
operating system.

Packages
1. Java run time environment using JDK1.6.

2. Good Strength Internet connection.

3. LAN connection.

4.2.1.2 Hardware Requirements

The hardware requirements for the project are:

1. Personal Computers having Pentium processors.

2. PC having at least 256mb RAM for speed up the operations.

4.3 Software System Attributes

Implementing project in java has several features over the language. Since Java is object-
oriented network-savvy programming language. Some call it a Better than C++. Other call it
the language of the Internet .Let us view some of the properties of Java that makes it good
language for keylogger programming

4.3.1 Reliability:

Software Reliability is the application of statistical techniques to data collected during


system development and operation to specify, predict, estimate, and assess the reliability
of software-based systems.Java is a standard, proven best practice that makes testing
more reliable, faster, and cheaper.Our system is reliable in detecting the user activity. The
use of application makes it possible to record all keystrokes and store it in log file.

7
4.3.2 Availability:
System Availability is calculated by modeling the system as an interconnection of parts in
series and parallel.Since our system is being designed in parallel that means If failure of a
part leads to the other part taking over the operations of the failed part.

4.3.3 Maintainability:

4.3.4 Portability:

As we are using a programming language Java provides the simplest and most familiar form
of portability -- source code portability. A given Java program should produce identical
results regardless of the underlying CPU, operating system, or Java compiler.So,The software
which we propose to design is machine independent and can work on different machines with
varied operating systems. Thus it completes the requirement of portability.

4.3.5 Platform-Independence.

Java is designed to operate in heterogeneous networks. To enable a Java Application to


execute anywhere on the network, the compiler generates architecture-neutral byte code, as
opposed to non-portable native code. For this code to be executed on a given computer, the
Java runtime system needs to be present. There are no platform-dependent aspects of the Java
language. Even libraries are platform-independent parts of the system. For example, the
window library provides a single interface for the GUI that is independent of the underlying
operating system.

4.3.6 Multithreading programming

One of the characteristics that make Java a powerful programming language is its support of
multithreading programming as an integrated part of the language. This is unique because
most modern programming languages either don’t offer multithreading or provide
multithreading as a non integrated package. Java, however, offers a single, integrated view of
multithreading. Multithreading programming is an essential aspect of programming in Java.

4.3.7 Security.

We are using the Java as the programming language, so Java itself is the secure language. It
provides better security than any other language. Another level of security is the byte code
verifier. Java programs are compiled into sets of instructions called byte codes. Before a Java
program is run, a verifier checks each byte code to make sure that nothing suspicious is going
on. In addition to these measures, Java has several safeguards that apply to applets. To

8
prevent program from committing random acts of violence against a user’s disk drive, an
applet can’t open, read, or write files on the user’s system. Our system matains security by
providing features including password protection,Hot key or Run command settings with
which only authorised person is able to access our system.

4.4 Product Features

4.4.1 Stroke Recording

Do they write letters in Word, use the email or maybe chatting is what they do all day?
That makes absolutely no difference to Keylogger.
Our Keylogger can record all the text typed in these applications.Our keylogger will log
keystrokes into the text file as soon as pressed by user. This log file will record all user
activities.

4.4.2 Record Clipboard Activity

Record all clipboard (copy-paste) actions performed by external user on PC.

4.4.3 Screen-Shot Monitoring (Visual Surveillance)

This feature completes all Textual/chat logging features by bringing you the visual
picture of your computer. You can easily change the frequency of taking screenshots from
your computer. This feature saves a lot of disk space by logging the most important
events.The shots taken are saved in JPG format to save your disk space.You can also set the
quality of the pictures taken .Facilitate to capture entire screen snap-shots periodically or
when CPU uses goes high beyond threshould value.
4.4.4 Log Viewer

Very sophisticated Log files Manager.Allows you to view, browse, delete, sort and
filter your log files.It allows you to view logs by dates and even the entire log.You can set the
viewer to marks only the dates when log was generated.You can also look for specific words
in a log file.Log file basically contains Textual log, Web log, Chat Log, Visual log and Audio
log.In order to save disk space you can configure the software to automatically delete old Log
files.

4.4.5 Upload Log by e-Mail

Thinking about going away from home for a couple of weeks and afraid of losing control
over your computer? Our Keylogger brings a solution: Sending logs by e-mail. In order to
save hard drive space you can specify if you wish to delete the sent logs from your HD.

9
4.4.6 Upload Log by LAN
Have few computers on your organization/home Network? All In One Keylogger brings a
solution: Sending logs to a Network Folder.You can even set the User & Password for the
Remote Network Folder and the Keylogger will make the required authentication to acquire
the access to that folder.In order to save hard drive space you can specify if you wish to
delete the sent logs from your HD.
4.4.7 Report Generation

Generate report of user activities in both html and txt file format.

4.4.8 Viewing Backup Activities

Provide backup of recorded internet/system activity details for future reference.

4.4.9Automatic Startup

Software starts monitoring as soon as windows start.

4.4.10Hot key or Run command settings

User can easily access the software when running in hidden mode by enabling Hot key or
Run command settings.

4.4.11 Advance View Option

Allow users to view each input keystroke or only printing keystrokes as per requirement.

4.4.12 Recording Multiple User account & Filtering

Record all users logged on your computer machine (including the Guest user). Our Keylogger
allows you to specify users accounts you want or don't want it to monitor.

4.4.13 Password Protection


Our Keylogger has password protection to prevent others from changing your configurations
or viewing the log files. After configuring and starting the program, you can activate
All In One Keylogger simply by typing your password, and it doesn't matter in what
application you are working with. Just type the password and our Keylogger will be
right there.
4.4.14 Privacy Features

All In One Key logger is completely invisible. You can configure it not to be listed in Task
Manager and to Hide its folder.You can also configure it not to be listed in Windows Task
Bar, System Tray, MSConfig(Startup entry), Uninstall list (Add/Remove programs) And start
menu.

10
4.4.15 Disable Anti-Keylogger Softwares

Our Keylogger will shutdown pre-defined anti-keylogger softwares, then will monitor and
prevent loading these pre-defined anti-keylogger softwares.
4.4.16 Disable Unwanted Softwares

Our Keylogger will shutdown user defined, unwanted softwares, then will monitor and
prevent loading these unwanted softwares.
4.4.17 Block Unwanted URLs

Our Keylogger will block the access to sites you define. All you need to do is to set the URL
or part of it in the URLs blocked list.
4.4.18 Filter application monitoring

Our Keylogger allows you to specify the programs you want you don't want it to monitor.
4.4.19Multilanguage - Localized Keylogger

Keylogger has a built-in German (Deutsch) Translation, French (Francais) Translation, Dutch
(Nederlands) Translation, Italian (Italiano) Translation, Spanish (Espanol) Translation,
Portuguese (Portugues) Translation, Swedish Translation (Svensk), Norwegian Translation
(Norske), Turkish Translation (Türkçe), Czech (Cestina) Translation - More will come in the
future.

// i had done upto this, do from this point

11
5. System Analysis
5.1 Feasibility study report
5.1.1 Operational Feasibility:

System will perform operations as per stated and is feasible to implement.


5.1.2 Technical feasibility:

Our software is technically feasible to implement because of the use of technology like Java.
5.1.3 Cost Feasibility:

The system being cost effective will be affordable by Law enforcement or private
investigators looking for evidence of an ongoing crime or inappropriate behavior.

5.2 Project Estimating:

Period Activity Description

8 jun 2010-20 Aug Requirement Analysis Information Collection


2010 and Feasibility Study

25 Aug 2010-30 System Design Design of the core part of


Sept 2010 the system modules

02 Jan 2011- 28 System Implementation Implementation of the


Feb 2011 core system modules

02 Mar 2011-12 System Testing Application of the


Apr 2011 various test cases to
system modules

12
6. System Design
6.1 High Level Design
6.1.1 Data Flow Diagram:

Data flow diagrams are commonly used during problem analysis. Data flow diagrams
(DFDs) are very useful in understanding a system and can be effectively used during
analysis. A DFD shows the flow of data through a system. It views a system as a
function that transforms the inputs into desired outputs. Here we try to draw DFD for
our application which looks like as follows:

6.2 Low Level Design


6.2.1 UML Diagrams:

13
The Unified Modeling Language (UML) is used to specify, visualize, modify, construct and
document the artifacts of an object-oriented software-intensive system under development.
UML offers a standard way to visualize a system's architectural blueprints

The designing diagrams for object oriented modelling are use case diagram, sequence
diagram, collaboration diagram, activity diagram, component diagram, package diagram,
class diagram.

6.2.1.1Use Case Diagram

14
6.2.1.2 Sequence Diagram

15
16
6.2.1.3 Activity Diagram

17
6.2.1.4 Collaboration Diagram

6.2.1.5 Class Diagram

18
7. Conclusion

We will develop a security monitor and user activity tracking system such that we
can get log of all activities of a unauthorized/suspected person. We send log files in
encrypted form on the owners e-mail Account.
The log files created will have a pressed keystrokes logging on each and every
keystroke also a different log file will be created which will contain screenshots of the user
activity which will give user a breif detail of the user activity to the owner.

The project is also for companies or practical labs where the administrator can
monitor the LAN without being present in that LAN area. (e.g.: sitting at home) Whenever he
wills , he can check mails of all the clients on which the software works.

He can select a particular user and can prepare a detail document on his activities for a
span of time. IF the owner finds that a particular application is illegal then he can use this log
files or user activitiy log to bust him.

8.References

8.1 Books Refered

[1] Operating Systems - Galvin

[2]. Complete Reference Java 2 -Herbert Schild

[3]. Software engineering -Jawadekar .W.S.

[4]. Object Oriented Modeling and Design :-James Rum Baugh, William Lorensen
Web-sites Referred

1 www.java.sun.com

2 www.javaworld.com

3 www.keylogger.org

IEEE papers Referred

[1] ‘ Keyloggers Increasing Threats to Computer Security and and Privacy” by seref
sagiroglu and gurol canbek.

19
[2] G. Canbek, “Analysis, design and implementation of keyloggers and anti-
keyloggers,” Gazi University, Institute Of Science And Technology, M.Sc. thesis (in
Turkish), Sept. 2005, pp. 103.
[3] J. Wurtzel, “Bugging your keyboard,” BBC News, Science/Nature;
http://news.bbc.co.uk/1/hi/sci/tech/1638795.stm, accessed Sept. 2006
.[4]. J. Williams, “I know what you did last logon: Monitoring software, spyware, and
privacy,” Microsoft Security News., vol. 4, no. 6, June 2007

20

Vous aimerez peut-être aussi