0% found this document useful (0 votes)
10 views

Logstream

The document discusses 'Logstream', a type of malware known as a keylogger that records keystrokes to steal sensitive information like passwords and PINs. It highlights the dual nature of logstream, which can be used for both malicious and legitimate purposes, such as monitoring criminal activity or aiding forensic analysis. The paper also outlines the hardware and software requirements for implementing logstream, potential future enhancements, and ethical considerations surrounding its use.

Uploaded by

Razvi Doomun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Logstream

The document discusses 'Logstream', a type of malware known as a keylogger that records keystrokes to steal sensitive information like passwords and PINs. It highlights the dual nature of logstream, which can be used for both malicious and legitimate purposes, such as monitoring criminal activity or aiding forensic analysis. The paper also outlines the hardware and software requirements for implementing logstream, potential future enhancements, and ethical considerations surrounding its use.

Uploaded by

Razvi Doomun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

International Journal of Computer Science and Information Security (IJCSIS),

Vol. 23, No. 2, March-April 2025

Copy Right:

Logstream © 2025 by Mrs. Rupali Dasarwar, Ms. Ruchika Zade, Ms. Samruddhi Chetule, Mr. Vedant
Tembhare is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0
International

Authors name:
1. Mrs. Rupali Dasarwar
2. Ms. Ruchika Zade
3. Ms. Samruddhi Chetule
4. Mr. Vedant Tembhare

Affiliations in a Paper:
📄 Title: Logstream
👨💻 Authors: Rupali Dasarwar, Ruchika Zade, Samruddhi Chetule, Vedant Tembhare
🏫 Affiliation: Department of AI & Data Science, [Rashtrasant Tukadoji Maharaj Nagpur University], [Nagpur,
India]
📧 Corresponding Email: [[email protected]]

Abstract:
Logstream are a type of computer malware that records keystroke events on the keyboard and saves them to a log file,
allowing it to steal sensitive data like passwords. Malicious software captures usernames, PINs, and passwords as a result.
Without drawing the user's attention, the hacker logstream possess a big threat to both Transactions such as commercial and
personal i.e., E-commerce, online banking, email chatting, and other similar activities are examples of online activities. An
attacker can collect valuable data without entering into a strong database or file server using this method. The main purpose of
logstream is to tamper with the chain of events that occur when a key is pressed, and information is displayed on the screen as
a result of the keystroke. Logstream can be used for both lawful and illegitimate objectives, depending on the user who is
utilising it logstream for systems, i.e., for identifying fraudulent users, can be used by system administrators. Logstream can
help a computer forensics analyst examine digital files more effectively. Logstream are extremely useful for keeping track on
ongoing criminal activity.
Keywords— Keylogger, python, security, keystrokes, encryption, etc.

https://google.academia.edu/JournalofComputerScience DRAFT https://sites.google.com/site/ijcsis/


ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 23, No. 2, March-April 2025
Logstream
Prof. Rupali Dasarwar Ms. Ruchika Zade
Project Guide Student 2
Department of Artificial Intelligence & Department of Artificial Intelligence &
Data Science Data Science
Wainganga College of Engineering and Wainganga College of Engineering and
Management, Nagpur Management, Nagpur

Ms.Samruddhi Chetule
Mr.Vedant Tembhare
Student 3
Student 4
Department of Artificial Intelligence &
Department of Artificial Intelligence &
Data Science
Data Science
Wainganga College of Engineering and
Wainganga College of Engineering and
Management, Nagpur
Management, Nagpur

ongoing crimes. Keystroke loggers can be used to capture


Abstract— Logstream are a type of computer malware that
and compile a record of all typed keys. Logstream can at
records keystroke events on the keyboard and saves them to
times be utilized as a spying instrument to bargain business
a log file, allowing it to steal sensitive data like passwords.
and state-possessed organization's information. Attackers can
Malicious software captures usernames, PINs, and
utilize logstream to gain admittance to the clients' private and
passwords as a result. Without drawing the user's attention,
delicate data, they can exploit the separated information to
the hacker logstream possess a big threat to both
perform online cash exchange the client's record or different
Transactions such as commercial and personal i.e., E-
vindictive stuff.
commerce, online banking, email chatting, and other similar
activities are examples of online activities. An attacker can
collect valuable data without entering into a strong database
or file server using this method. The main purpose of
logstream is to tamper with the chain of events that occur II. PROBLEM IDENTIFICATION
when a key is pressed, and information is displayed on the There are several unlawful uses for stealing user information,
screen as a result of the keystroke. Logstream can be used including identity theft, credit card and bank fraud, software
for both lawful and illegitimate objectives, depending on the and service theft, to mention a few. Key logging, or the
user who is utilising it logstream for systems, i.e., for eavesdropping, harvesting, and leakage of user-issued
identifying fraudulent users, can be used by system keystrokes, is how this is accomplished. Keyloggers are
administrators. Logstream can help a computer forensics simple to set up and use. The financial loss might be
analyst examine digital files more effectively. Logstream are significant when used for fraudulent purposes as a component
extremely useful for keeping track on ongoing criminal of more complex criminal heists. Some significant key
activity. logger-based occurrences that were reported in [7] are
displayed in Table 1.1. Over the years, several approaches
Keywords— Keylogger, python, security, keystrokes, and methods have been put up to address the widespread
encryption, etc. issue of harmful software. Nevertheless, none of the current
methods are adequate for the particular issue of keylogger
detection. The restricted applicability of signature-based
solutions stems from their ease of evasion and the need to
I. INTRODUCTION
isolate and extract a valid signature before detecting a new
Logstream program also known as keyloggers is a kind
danger. The implementation of a key logger is seldom
of malware that has capability to maliciously track input of
difficult, as we demonstrate in the next section. It is simple
the user from the keyboard in aim to retrieve private
for even novice programmers to create new key logger
information. Logstream thus cause a major threat to
variations, rendering a previously legitimate signature
business and personal activities of kind like transactions,
useless. Some of these restrictions are addressed by behavior-
online banking, email and chat. The keyboard is the prime
based detection methods. By analyzing the behavior of either
target as it allows logstream to retrieve user input to the
malware [8] or normal programs [6], they seek to differentiate
system as it is the most common way user interacts with a
between malicious and benign apps. There are various
computer. There are two types of logstream that exists in
methods for examining and understanding the desired
market, a software logstream and a hardware logstream
behavior. The majority, however, depend on which runtime
among which software logstream are widely used and are
system or library calls are made.Since many legitimate
easy to plant and cause substantial damage. Logstream
software (such as shortcut managers and keyboard remapping
essentially performs two tasks that is guiding into client
utilities) intercept keystrokes in the background and behave
input stream to get keystrokes and moving the information
quite similarly, it is unfortunately impossible to characterize
to a distant area (for example- mail). The fundamental goal
keyloggers using system calls. One clear source of false
of logstream is to meddle in the chain of occasions that
positives is these applications. Because there are so many
happen when a key is squeezed and when the information is
programs of this type and they are widely found in OEM
shown on the screen because of a keystroke. Logstream can
software, white-listing is likewise not a viable solution to this
be used for legitimate as well as illegitimate purposes, it
issue. Furthermore, definition of key logging behavior based
basically depends on user who is using it. System
on syscall is also susceptible to false negatives. Think of the
administrators can use logstream for systems, i.e. for
ideal model that can deduce crucial logging behavior from
detecting suspicious users. Logstream can effectively assist
system calls that indicate the explicit leakage of sensitive
a computer forensics analyst in the examination of digital
data.
media. Logstream are especially effective in monitoring
https://google.academia.edu/JournalofComputerScience DRAFT https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 23, No. 2, March-April 2025

III. LITERATURE SURVEY the given amount the data will automatically be sent to the
Sr Paper Title Author Name Description email id as provided by the user. The keyboard input is
No. recorded and based on what is pressed, different conditions
1. Enhancing 1Rutik Kapare, Malware are called.
digital 2Aditya Gawade, avoidance • For a normal letter, it gets added to the string
security with 3Aditya Kamble, procedures • If a backspace, the last letter gets deleted
the 4Pallavi that • If space key is pressed, a white space is added between the
advanced Tembhurnikar disguise or words.
keylogger 1Student, 2Student, defer data After reaching the word limit it then takes a screenshot using
project(2024) 3Student, spillage are the pyscreenshot. grab () function. It then saves the image
4Professor 1School not a and attaches it the final message which is first encoded
of Engineering, concern for into a string using the MIMEText. The final message is
1Ajeenkya DY Patil this then sent to the user.
University discovery Functional Requirements
strategy • SMTP server
2. Keylogger Atiya Kazi*1, This • Email library
detection(2023) Manthan procedure •Internetconnection.
Mungekar*2, requires a If valid
Dnyanesh ton of Users enters Connection with
User Types Key
email id & email Established
Sawant*3, Pankaj calculation password
Mirashi*4 and the
bogus
positive
rate is
extremely Log=” “
Limit= 30
high.
3. Keylogger Jeppiaar Nagar, This
Capture Rajiv Gandhi Salai, method can
(keystrocks) differentiate Logstream reads
which type of
(2022) the running key
Keylogger
process
from the If chapter If space, add If backspace
appends it to log blank to log remove last letter
normal from log
processes
with a high
detection yes No
rate and a Takes screenshot
images
low false Is len(log)>limit
alarm rate.

4. Realtime Manan Kalpesh System can


working Shah 1 , Devashree distinguish Final message Attaches it to the
sent to the email final message
of keylogger Kataria 2 , S. bit level
malware Bharath Raj 3 , keylogging
analysis(2020) Priya G * that catch
Department of console Fig: flowchart of logstream
CSE, VIT Vellore driver,
especially
cushion and
recognize
their
underlying
drivers.

IV. PROPOSED SYSTEM


When the code is executed, the user is asked to sign in using
his email credentials. If the entered data is wrong an error
will pop up not allowing the program to send the data. If
the details are entered right the program starts to record
the data the user types. We have added conditions for
https://google.academia.edu/JournalofComputerScience
example a limit to be sent. So, if the word limit exceeds DRAFT https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 23, No. 2, March-April 2025

VI. RESULT
V. HARDWARE & SOFTWARE REQUIREMENT
Hardware Required:

Some basic hardware components may be involved are

Computer System (Windows OS):


A laptop or desktop running Windows (Windows 10 or
higher recommended).
Python needs to be installed on the system.

Keyboard (External or Built-in):


Any standard USB or wireless keyboard, or the built-in
keyboard on a laptop.

USB Drive (For Portable logstream Deployment): fig. screenshot of the working
If you need to run the logstream on another system without screen
installation, a USB drive can be used to store the logstream
script and transfer it to other machines.

Network Adapter (for Advanced Logstream): VII. CONCLUSION


If you are implementing remote data logging (sending logs In a world increasingly reliant on digital technologies,
to email or a server), a reliable Wi-Fi or Ethernet connection monitoring software has become a versatile tool with
is essential. various applications, from enhancing security to ensuring
parental control and optimizing network performance.
External Keyboard Logger Devices (Optional): However, the responsible and ethical use of monitoring
Some logstream setups use hardware logstream (physical software is paramount. Our analysis has shed light on the
devices) that attach between the keyboard and the computer. intricate interplay of legal, ethical, and security
These devices capture keystrokes independently of the considerations that surround the use of monitoring software.
operating system and Python script. As demonstrated, monitoring software can be a powerful
asset when used ethically and responsibly. It maintains data
Software Required: security, improving productivity, and safeguarding
individuals from threats. However, we concluded that the
Below are the essential software tools and dependencies captured keystrokes provides system information and send
required to build and run a Python-based logstream on a the encrypted emails on the device inspite of audio
Windows system: information.
1. Operating System
Windows 10/11 (or any recent version of Windows)
The logstream will rely on libraries compatible with the
Windows OS for keyboard event monitoring. VIII. FUTURE SCOPE
2. Python Interpreter Advanced Applications and Enhancements
Python 3.x o Download from Python’s official website. • AI-IntegratedLogstream: Future versions can leverage AI
and machine learning to analyze typed patterns and detect
3. Code Editor / IDE (Optional) suspicious activities. For example: Detect potential phishing
Visual Studio Code / PyCharm / Sublime Text o While any attempts. Identify insider threats based on unusual keystrokes
text editor can work, using an IDE or code editor makes or behavioral deviations.
development and debugging easier. • Real-time Analytics: Create real-time dashboards for
monitored data, useful for organizations monitoring multiple
4. Python Libraries / Modules devices. Natural Language Processing (NLP) could extract
pynput (for keyboard input monitoring) This library allows insights from the logged text, such as sentiment analysis of
your program to listen for keyboard events such as key employees' or users' input.
presses and releases.
Integration with IoT and Smart Systems
5. Text File Viewer / Log Manager A logstream on smart devices or workstations could be
Notepad or any text editor (for viewing keystroke logs). integrated with a central monitoring system to prevent
The keystrokes will be saved into a .txt file, which can be cyberattacks.
opened using Notepad or any similar editor. For instance: Detecting unauthorized access on IoT networks
by monitoring device behavior remotely. Integration with AI-
6. Python Package Installer (PIP) based anomaly detection systems to take preventive actions if
PIP usually comes bundled with Python. It is required to suspicious activities are detected.
install external libraries such as pynput.

7. Windows Terminal / Command Prompt


Command Prompt or Windows PowerShell is required to
run the Python scrip.
https://google.academia.edu/JournalofComputerScience DRAFT https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 23, No. 2, March-April 2025

IX. REFERENCES
1.Real Time Working of Keylogger Malware Analysis
Manan Kalpesh Shah 1 , Devashree Kataria 2 , S. Bharath
Raj 3 , Priya G * Department of CSE, VIT Vellore

2.Keylogger-Capture(Keystrocks), Screenshot,Audio File,


Operating System Information With Ip Address

3.Keylogger Detection Atiya Kazi*1, Manthan


Mungekar*2, Dnyanesh Sawant*3, Pankaj Mirashi*4
*1assistant Professor, Department Of It Famt, Ratnagiri
*2,3,4student, Department Of It, Famt, Ratnagiri

4.Enhancing Digital Security With The Advanced


Keylogger Project 1Rutik Kapare, 2Aditya Gawade,
3Aditya Kamble, 4Pallavi Tembhurnikar 1Student,
2Student, 3Student, 4Professor 1School of Engineering,
1Ajeenkya DY Patil University, Pune, India

https://google.academia.edu/JournalofComputerScience DRAFT https://sites.google.com/site/ijcsis/


ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 23, No. 2, March-April 2025

1. Zhang, L., et al. (2020). Integration of Ultrasonic and Augmented Reality and Virtual Environments, 17(1), 48-
LiDAR Sensors for Real-Time Obstacle Detection in 60.
Smart Navigation Systems for the Visually Impaired. 5. Gupta, S., et al. (2022). Text-to-Speech Algorithms for
Journal of Robotics and Automation, 28(4), 215-225. Assistive Devices: Enhancements for Multilingual and
2. Patel, S., et al. (2019). Design and Implementation of an Personalized Feedback Systems. Journal of Speech
Assistive Device for Visually Impaired Individuals Processing and Assistive Technology, 19(3), 130-142.
Using Machine Learning Algorithms and Object 6. Bhattacharya, S., et al. (2021). Cloud-Based Assistive
Recognition. International Journal of Human-Computer Technologies for the Visually Impaired: Leveraging
Interaction, 36(9), 805-818. Data Analysis and Machine Learning for Personalized
3. Kumar, R., & Sharma, V. (2021). Smart Home User Experiences. Journal of Cloud Computing and
Integration for Visually Impaired: A Review of IoT and Assistive Technologies, 12(2), 99-112.
Cloud Computing Applications. Journal of Smart 7. Mishra, P., et al. (2022). Real-Time Environmental
Technologies in Healthcare, 10(2), 56-69. Sensing for Assistive Devices: Detection of
4. Tan, J., et al. (2020). Augmented Reality-Based Temperature, Humidity, and Air Quality for Improved
Navigation Aid for the Blind: Real-Time Audio Navigation. Journal of Environmental Monitoring and
Guidance and Object Recognition. Journal of Assistance, 4(1), 22-35.

https://google.academia.edu/JournalofComputerScience DRAFT https://sites.google.com/site/ijcsis/


ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 23, No. 2, March-April 2025

Call for Papers – April 2025 Issue


International Journal of Computer Science and Information Security (IJCSIS)
ISSN: 1947-5500 | Impact Factor: 1.38
The International Journal of Computer Science and Information Security (IJCSIS) has
received a total of 27,959 citations as of March 2025. [Google Scholar]
Website: https://sites.google.com/site/ijcsis/
The International Journal of Computer Science and Information Security (IJCSIS) invites
high-quality research papers for its April 2025 issue. IJCSIS is a peer-reviewed, open-
access journal that publishes original research articles, review papers, and technical
studies in the fields of computer science, cybersecurity, artificial intelligence,
information security, data science, and emerging technologies.
Topics of Interest:
We welcome submissions in (but not limited to) the following areas:
• Cybersecurity & Information Security
• Artificial Intelligence & Machine Learning
• Data Science & Big Data Analytics
• Computer Networks & Cloud Computing
• Blockchain & Cryptography
• Internet of Things (IoT) & Edge Computing
• Software Engineering & Software Security
• Digital Forensics & Cyber Threat Intelligence
• Human-Computer Interaction & Usability
• Computational Intelligence & Algorithms
Important Dates:
• Manuscript Submission Deadline: April 30, 2025
• Acceptance Notification: May 15, 2025
• Publication Date: May 31, 2025

1|Page

https://google.academia.edu/JournalofComputerScience DRAFT https://sites.google.com/site/ijcsis/


ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 23, No. 2, March-April 2025

Submission Guidelines:
Authors are requested to submit their manuscripts via the IJCSIS online submission
system or email at [email protected]. The paper should be formatted according to
IJCSIS template guidelines and must not have been previously published or under
consideration elsewhere.
Review Process:
All submitted manuscripts undergo a double-blind peer-review process to ensure high
academic quality. Authors will receive constructive feedback from expert reviewers.
Why Publish with IJCSIS?
• Indexed in major databases such as Google Scholar, ResearchGate, and more.
• High visibility with open-access publication.
• Fast peer-review and publication process.
• DOI and indexing services for all published papers.
Contact Information:
For any inquiries, please contact the editorial team at [[email protected]] or visit
our website at [ https://independent.academia.edu/JournalofComputerScienceIJCSIS
].
We look forward to your submissions!
IJCSIS Editorial Board
https://sites.google.com/site/ijcsis/ijcsis/editorial-board

2|Page

https://google.academia.edu/JournalofComputerScience DRAFT https://sites.google.com/site/ijcsis/


ISSN 1947-5500

You might also like