Perancangan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Pengguna Smartphone Menggunakan Aplikasi Smart Keylogger

Perancangan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Pengguna Smartphone Menggunakan Aplikasi Smart keylogger

Authors

  • Sari Wulandari universitas negeri makassar

DOI:

https://doi.org/10.61255/pisces.v1i2.98

Keywords:

Smart Keylogger, Sypware, Smartphone, User, Security

Abstract

The era of growing information technology has led to increasing threats to the security and privacy of computer and mobile device users, such as data theft and unauthorized use. In addition, the use of the internet by children and adolescents also requires special supervision. Therefore this research contributes to the use of the smart keylogger application as an effective solution for monitoring smartphone user activity and protecting user data security and privacy, especially in use by children and adolescents. The research method used is experimental research, in which a smart keylogger application is installed on a user's smartphone to monitor user activity over a certain period. The results of the study show that the smart keylogger application runs well in the background of the device, recording every keystroke the user makes, including internet browsing history and other activities. Overall, this spyware-based smart keylogger application is an effective solution for monitoring smartphone user activity, protecting data security and privacy, and providing more effective monitoring of internet use by children and adolescents.

Abstract views: 623 , PDF downloads: 222

Downloads

Download data is not yet available.

References

Aji, A. B. (2017). Pemanfaatan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Penggunaan Keyboard User. Prosiding SNATIF Ke-4 Tahun 2017, 153–160.

Bonok, Z. (2011). Pentingnya Apliaksi Penanganan Spyware untuk Keamanan Privasi User pada Sebuah Komputer. Saintek, 6(1), 1–11. http://www.ainfo.inia.uy/digital/bitstream/item/7130/1/LUZARDO-BUIATRIA-2017.pdf

Hasibuan, M. S. (2016). Keylogger pada Aspek Keamanan Komputer. Teknovasi, 3(1), 8–15.

Hermawan, R. (2016). Analisa Cara Kerja dan Dampak dari Serangan Virus Spyware. STRING (Satuan Tulisan Riset Dan Inovasi Teknologi), 1(1), 10–18. https://doi.org/10.30998/string.v1i1.964

Hidayat, A., & Maesyaroh, S. S. (2022). Analisis Penggunaan Gadget pada Anak Usia Dini. JURNAL SYNTAX IMPERATIF : Jurnal Ilmu Sosial Dan Pendidikan, 1(5), 356. https://doi.org/10.36418/syntax-imperatif.v1i5.159

Hidayati, I., & Afiatin, T. (2020). Peran Kontrol Diri dan Mediasi Orang Tua terhadap Perilaku Penggunaan Internet Secara Berlebihan. Gadjah Mada Journal of Psychology (GamaJoP), 6(1), 43. https://doi.org/10.22146/gamajop.52744

Imam, C., Siregar, M. F., Informasi, T., Battuta, U., Mada, J. G., No, M., Informatika, P., Battuta, U., Mada, J. G., & No, M. (2021). Pemanfaatan Keylogger dalam Aspek Keamanan Berbasis Spyware untuk Memonitoring Laptop Menggunakan Refog Key Logger. 10(1), 105–111.

Javaheri, D., Hosseinzadeh, M., & Rahmani, A. M. (2018). Detection and elimination of spyware and ransomware by intercepting kernel-level system routines. IEEE Access, 6, 78321–78332. https://doi.org/10.1109/ACCESS.2018.2884964

Karlina, D. A., Aeni, A. N., & Syahid, A. A. (2020). Mengenal Dampak Positif dan Negatif Internet Untuk Anak pada Orang Tua. Jurnal Pasca Dharma Pengabdian Masyarakat, 1(2), 53–56. https://ejournal.upi.edu/index.php/JPDPM/article/view/24002

Masturi, H., Hasanawi, A., & Hasanawi, A. (2021). Optimasi Gadget dan Implikasinya Terhadap Pola Asuh Anak. Jurnal Inovasi Penelitian, 1(10), 1–208.

Navarro, J., Naudon, E., & Oliveira, D. (2012). Bridging the semantic gap to mitigate kernel-level keyloggers. Proceedings - IEEE CS Security and Privacy Workshops, SPW 2012, 97–103. https://doi.org/10.1109/SPW.2012.22

Nugraha, J. D., Budiono, A., & Almaarif, A. (2019). Analisis Malware Berdasarkan API Call Memory Dengan Metode Deteksi Signature-Based. Jurnal Rekayasa Sistem & Industri (JRSI), 6(02), 77. https://doi.org/10.25124/jrsi.v6i02.351

Pandey, K., Naik, M., Qamar, J., & Patil, M. (2015). Spyware Detection Using Data Mining. International Journal of Engineering and Techniques, 1(2), 5–8. http://www.ijetjournal.org

Tuli, P., & Sahu, P. (2013). Pemantauan Sistem dan Penggunaan Keamanan Keylogger. 106–111.

Zulfa, M. I., & Subiyanta, E. (2015). Pemanfaatan Spyware Untuk Monitoring Aktivitas Keyboard Dalam Jaringan Microsoft Windows. Emitor: Jurnal Teknik Elektro, 15(1), 11–14. https://doi.org/10.23917/emitor.v15i1.1752

Downloads

Published

2024-03-12

How to Cite

Sari Wulandari. (2024). Perancangan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Pengguna Smartphone Menggunakan Aplikasi Smart Keylogger: Perancangan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Pengguna Smartphone Menggunakan Aplikasi Smart keylogger . Progressive Information, Security, Computer, and Embedded System, 2(1), 46–54. https://doi.org/10.61255/pisces.v1i2.98

Issue

Section

Articles