Logstream
Logstream
Copy Right:
Logstream © 2025 by Mrs. Rupali Dasarwar, Ms. Ruchika Zade, Ms. Samruddhi Chetule, Mr. Vedant
Tembhare is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0
International
Authors name:
1. Mrs. Rupali Dasarwar
2. Ms. Ruchika Zade
3. Ms. Samruddhi Chetule
4. Mr. Vedant Tembhare
Affiliations in a Paper:
📄 Title: Logstream
👨💻 Authors: Rupali Dasarwar, Ruchika Zade, Samruddhi Chetule, Vedant Tembhare
🏫 Affiliation: Department of AI & Data Science, [Rashtrasant Tukadoji Maharaj Nagpur University], [Nagpur,
India]
📧 Corresponding Email: [[email protected]]
Abstract:
Logstream are a type of computer malware that records keystroke events on the keyboard and saves them to a log file,
allowing it to steal sensitive data like passwords. Malicious software captures usernames, PINs, and passwords as a result.
Without drawing the user's attention, the hacker logstream possess a big threat to both Transactions such as commercial and
personal i.e., E-commerce, online banking, email chatting, and other similar activities are examples of online activities. An
attacker can collect valuable data without entering into a strong database or file server using this method. The main purpose of
logstream is to tamper with the chain of events that occur when a key is pressed, and information is displayed on the screen as
a result of the keystroke. Logstream can be used for both lawful and illegitimate objectives, depending on the user who is
utilising it logstream for systems, i.e., for identifying fraudulent users, can be used by system administrators. Logstream can
help a computer forensics analyst examine digital files more effectively. Logstream are extremely useful for keeping track on
ongoing criminal activity.
Keywords— Keylogger, python, security, keystrokes, encryption, etc.
Ms.Samruddhi Chetule
Mr.Vedant Tembhare
Student 3
Student 4
Department of Artificial Intelligence &
Department of Artificial Intelligence &
Data Science
Data Science
Wainganga College of Engineering and
Wainganga College of Engineering and
Management, Nagpur
Management, Nagpur
III. LITERATURE SURVEY the given amount the data will automatically be sent to the
Sr Paper Title Author Name Description email id as provided by the user. The keyboard input is
No. recorded and based on what is pressed, different conditions
1. Enhancing 1Rutik Kapare, Malware are called.
digital 2Aditya Gawade, avoidance • For a normal letter, it gets added to the string
security with 3Aditya Kamble, procedures • If a backspace, the last letter gets deleted
the 4Pallavi that • If space key is pressed, a white space is added between the
advanced Tembhurnikar disguise or words.
keylogger 1Student, 2Student, defer data After reaching the word limit it then takes a screenshot using
project(2024) 3Student, spillage are the pyscreenshot. grab () function. It then saves the image
4Professor 1School not a and attaches it the final message which is first encoded
of Engineering, concern for into a string using the MIMEText. The final message is
1Ajeenkya DY Patil this then sent to the user.
University discovery Functional Requirements
strategy • SMTP server
2. Keylogger Atiya Kazi*1, This • Email library
detection(2023) Manthan procedure •Internetconnection.
Mungekar*2, requires a If valid
Dnyanesh ton of Users enters Connection with
User Types Key
email id & email Established
Sawant*3, Pankaj calculation password
Mirashi*4 and the
bogus
positive
rate is
extremely Log=” “
Limit= 30
high.
3. Keylogger Jeppiaar Nagar, This
Capture Rajiv Gandhi Salai, method can
(keystrocks) differentiate Logstream reads
which type of
(2022) the running key
Keylogger
process
from the If chapter If space, add If backspace
appends it to log blank to log remove last letter
normal from log
processes
with a high
detection yes No
rate and a Takes screenshot
images
low false Is len(log)>limit
alarm rate.
VI. RESULT
V. HARDWARE & SOFTWARE REQUIREMENT
Hardware Required:
USB Drive (For Portable logstream Deployment): fig. screenshot of the working
If you need to run the logstream on another system without screen
installation, a USB drive can be used to store the logstream
script and transfer it to other machines.
IX. REFERENCES
1.Real Time Working of Keylogger Malware Analysis
Manan Kalpesh Shah 1 , Devashree Kataria 2 , S. Bharath
Raj 3 , Priya G * Department of CSE, VIT Vellore
1. Zhang, L., et al. (2020). Integration of Ultrasonic and Augmented Reality and Virtual Environments, 17(1), 48-
LiDAR Sensors for Real-Time Obstacle Detection in 60.
Smart Navigation Systems for the Visually Impaired. 5. Gupta, S., et al. (2022). Text-to-Speech Algorithms for
Journal of Robotics and Automation, 28(4), 215-225. Assistive Devices: Enhancements for Multilingual and
2. Patel, S., et al. (2019). Design and Implementation of an Personalized Feedback Systems. Journal of Speech
Assistive Device for Visually Impaired Individuals Processing and Assistive Technology, 19(3), 130-142.
Using Machine Learning Algorithms and Object 6. Bhattacharya, S., et al. (2021). Cloud-Based Assistive
Recognition. International Journal of Human-Computer Technologies for the Visually Impaired: Leveraging
Interaction, 36(9), 805-818. Data Analysis and Machine Learning for Personalized
3. Kumar, R., & Sharma, V. (2021). Smart Home User Experiences. Journal of Cloud Computing and
Integration for Visually Impaired: A Review of IoT and Assistive Technologies, 12(2), 99-112.
Cloud Computing Applications. Journal of Smart 7. Mishra, P., et al. (2022). Real-Time Environmental
Technologies in Healthcare, 10(2), 56-69. Sensing for Assistive Devices: Detection of
4. Tan, J., et al. (2020). Augmented Reality-Based Temperature, Humidity, and Air Quality for Improved
Navigation Aid for the Blind: Real-Time Audio Navigation. Journal of Environmental Monitoring and
Guidance and Object Recognition. Journal of Assistance, 4(1), 22-35.
1|Page
Submission Guidelines:
Authors are requested to submit their manuscripts via the IJCSIS online submission
system or email at [email protected]. The paper should be formatted according to
IJCSIS template guidelines and must not have been previously published or under
consideration elsewhere.
Review Process:
All submitted manuscripts undergo a double-blind peer-review process to ensure high
academic quality. Authors will receive constructive feedback from expert reviewers.
Why Publish with IJCSIS?
• Indexed in major databases such as Google Scholar, ResearchGate, and more.
• High visibility with open-access publication.
• Fast peer-review and publication process.
• DOI and indexing services for all published papers.
Contact Information:
For any inquiries, please contact the editorial team at [[email protected]] or visit
our website at [ https://independent.academia.edu/JournalofComputerScienceIJCSIS
].
We look forward to your submissions!
IJCSIS Editorial Board
https://sites.google.com/site/ijcsis/ijcsis/editorial-board
2|Page