Perancangan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Pengguna Smartphone Menggunakan Aplikasi Smart Keylogger
Perancangan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Pengguna Smartphone Menggunakan Aplikasi Smart keylogger
DOI:
https://doi.org/10.61255/pisces.v1i2.98Keywords:
Smart Keylogger, Sypware, Smartphone, User, SecurityAbstract
The era of growing information technology has led to increasing threats to the security and privacy of computer and mobile device users, such as data theft and unauthorized use. In addition, the use of the internet by children and adolescents also requires special supervision. Therefore this research contributes to the use of the smart keylogger application as an effective solution for monitoring smartphone user activity and protecting user data security and privacy, especially in use by children and adolescents. The research method used is experimental research, in which a smart keylogger application is installed on a user's smartphone to monitor user activity over a certain period. The results of the study show that the smart keylogger application runs well in the background of the device, recording every keystroke the user makes, including internet browsing history and other activities. Overall, this spyware-based smart keylogger application is an effective solution for monitoring smartphone user activity, protecting data security and privacy, and providing more effective monitoring of internet use by children and adolescents.
Abstract views: 623
,
PDF downloads: 222
Downloads
References
Aji, A. B. (2017). Pemanfaatan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Penggunaan Keyboard User. Prosiding SNATIF Ke-4 Tahun 2017, 153–160.
Bonok, Z. (2011). Pentingnya Apliaksi Penanganan Spyware untuk Keamanan Privasi User pada Sebuah Komputer. Saintek, 6(1), 1–11. http://www.ainfo.inia.uy/digital/bitstream/item/7130/1/LUZARDO-BUIATRIA-2017.pdf
Hasibuan, M. S. (2016). Keylogger pada Aspek Keamanan Komputer. Teknovasi, 3(1), 8–15.
Hermawan, R. (2016). Analisa Cara Kerja dan Dampak dari Serangan Virus Spyware. STRING (Satuan Tulisan Riset Dan Inovasi Teknologi), 1(1), 10–18. https://doi.org/10.30998/string.v1i1.964
Hidayat, A., & Maesyaroh, S. S. (2022). Analisis Penggunaan Gadget pada Anak Usia Dini. JURNAL SYNTAX IMPERATIF : Jurnal Ilmu Sosial Dan Pendidikan, 1(5), 356. https://doi.org/10.36418/syntax-imperatif.v1i5.159
Hidayati, I., & Afiatin, T. (2020). Peran Kontrol Diri dan Mediasi Orang Tua terhadap Perilaku Penggunaan Internet Secara Berlebihan. Gadjah Mada Journal of Psychology (GamaJoP), 6(1), 43. https://doi.org/10.22146/gamajop.52744
Imam, C., Siregar, M. F., Informasi, T., Battuta, U., Mada, J. G., No, M., Informatika, P., Battuta, U., Mada, J. G., & No, M. (2021). Pemanfaatan Keylogger dalam Aspek Keamanan Berbasis Spyware untuk Memonitoring Laptop Menggunakan Refog Key Logger. 10(1), 105–111.
Javaheri, D., Hosseinzadeh, M., & Rahmani, A. M. (2018). Detection and elimination of spyware and ransomware by intercepting kernel-level system routines. IEEE Access, 6, 78321–78332. https://doi.org/10.1109/ACCESS.2018.2884964
Karlina, D. A., Aeni, A. N., & Syahid, A. A. (2020). Mengenal Dampak Positif dan Negatif Internet Untuk Anak pada Orang Tua. Jurnal Pasca Dharma Pengabdian Masyarakat, 1(2), 53–56. https://ejournal.upi.edu/index.php/JPDPM/article/view/24002
Masturi, H., Hasanawi, A., & Hasanawi, A. (2021). Optimasi Gadget dan Implikasinya Terhadap Pola Asuh Anak. Jurnal Inovasi Penelitian, 1(10), 1–208.
Navarro, J., Naudon, E., & Oliveira, D. (2012). Bridging the semantic gap to mitigate kernel-level keyloggers. Proceedings - IEEE CS Security and Privacy Workshops, SPW 2012, 97–103. https://doi.org/10.1109/SPW.2012.22
Nugraha, J. D., Budiono, A., & Almaarif, A. (2019). Analisis Malware Berdasarkan API Call Memory Dengan Metode Deteksi Signature-Based. Jurnal Rekayasa Sistem & Industri (JRSI), 6(02), 77. https://doi.org/10.25124/jrsi.v6i02.351
Pandey, K., Naik, M., Qamar, J., & Patil, M. (2015). Spyware Detection Using Data Mining. International Journal of Engineering and Techniques, 1(2), 5–8. http://www.ijetjournal.org
Tuli, P., & Sahu, P. (2013). Pemantauan Sistem dan Penggunaan Keamanan Keylogger. 106–111.
Zulfa, M. I., & Subiyanta, E. (2015). Pemanfaatan Spyware Untuk Monitoring Aktivitas Keyboard Dalam Jaringan Microsoft Windows. Emitor: Jurnal Teknik Elektro, 15(1), 11–14. https://doi.org/10.23917/emitor.v15i1.1752
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Sari Wulandari, Jumadi Mabe Parenreng

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








Email: fajarb@diginus.id