CyberCop: A Remote Surveillance Solution


Authors : Anurag Patil; Sohan S Shetty; Varun Raj B; Sahana P Shankar

Volume/Issue : Volume 9 - 2024, Issue 5 - May

Google Scholar : https://tinyurl.com/3zx3y8cb

Scribd : https://tinyurl.com/3a498ujs

DOI : https://doi.org/10.38124/ijisrt/IJISRT24MAY2420

Abstract : In the realm of contemporary law enforcement, combating cybercrime necessitates innovative tools capable of navigating the digital landscape effectively. This paper examines the development and implications of a custom Remote Access Tool (RAT) tailored specifically for law enforcement use and made specifically for the Linux environment. Unlike conventional malware, this RAT operates covertly, evading detection by traditional antivirus software, and enables authorized agents to remotely access and gather crucial information from target systems. Through a user- friendly interface and advanced functionalities, it empowers law enforcement agencies to conduct digital investigations with unprecedented efficiency and efficacy, while also raising important considerations regarding legality, transparency, and ethical conduct in the pursuit of justice.

Keywords : Remote Access Tool, Linux OS, Law Enforcement Agencies, Anti-Virus Evasion.

References :

  1. Kondalwar, M.N. and Shelke, C.J., 2014. Remote administrative trojan/tool (RAT). Int. J. Comput. Sci. Mob. Comput, 3333(3), pp.482-487.
  2. Barapatre, K. and Parkhi, P., 2020. Android Spy Agent-Remote Access Trojan. International Research Journal of Engineering and Technology.
  3. P. A. S. D. S. W. A. K., 2017. Remote Access Tool Using Metasploit. International Journal on Recent and Innovation Trends in Computing and Communication, 5(4), pp. 425–427.
  4. Bauri, M.C.K., Indulkar, M.C., Jadhav, M.S. and Khandagale, A.S., Windows Post Exploitation [MSF] Keylogger for Security.
  5. Tabatabai Irani, M. and Weippl, E.R., 2009. Automation of post‐exploitation. International Journal of Web Information Systems, 5(4), pp.518-536.
  6. Yin, K.S. and Khine, M.A., 2019. Optimal remote access Trojans detection based on network behavior. International Journal of Electrical & Computer Engineering (2088-8708), 9(3).
  7. Adachi, D. and Omote, K., 2016. A host-based detection method of remote access trojan in the early stage. In Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings 12 (pp. 110-121). Springer International Publishing.
  8. Chen, W.A.N.G., Chun, G.U.O., Guowei, S.H.E.N. and Yunhe, C.U.I., 2021. Research of Remote Access Trojan Early Detection Method Using Sequence Analysis. Journal of Frontiers of Computer Science & Technology, 15(12).
  9. De Mello, F.L., 2020. A survey on machine learning adversarial attacks. Journal of Information Security and Cryptography (Enigma), 7(1), pp.1-7.
  10. Chigozie-Okwum, C. and Ajah, I. (2019). Botnet Identification Using Machine Learning Techniques: A Survey.
  11. Ibrahim, M.R. and Thanoon, K., 2022. Quasar Remote Access Trojan feature extraction depending on Ethical Hacking.
  12. Kara, İ. and Aydos, M., 2019. The ghost in the system: technical analysis of remote access trojan. International Journal on Information Technologies & Security, 11(1), pp.73-84.
  13. Al-Saadoon, G. and Al-Bayatti, H.M., 2011. A comparison of trojan virus behavior in Linux and Windows operating systems. arXiv preprint arXiv:1105.1234.
  14. Taib, A.M. and Azman, N.N.K.A., 2018. Experimental Analysis of Trojan Horse and Worm Attacks in Windows Environment. Journal of Advanced Research in Computing and Applications, 13(1), pp.1-9.
  15. Chaudhari, F. and Patel, S., 2017. Survey: Trojan horse Detection Techniques in Network. Int J Appl Math Comput Sci, 9, pp.117-119.

In the realm of contemporary law enforcement, combating cybercrime necessitates innovative tools capable of navigating the digital landscape effectively. This paper examines the development and implications of a custom Remote Access Tool (RAT) tailored specifically for law enforcement use and made specifically for the Linux environment. Unlike conventional malware, this RAT operates covertly, evading detection by traditional antivirus software, and enables authorized agents to remotely access and gather crucial information from target systems. Through a user- friendly interface and advanced functionalities, it empowers law enforcement agencies to conduct digital investigations with unprecedented efficiency and efficacy, while also raising important considerations regarding legality, transparency, and ethical conduct in the pursuit of justice.

Keywords : Remote Access Tool, Linux OS, Law Enforcement Agencies, Anti-Virus Evasion.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe