Detection and Avoidance of SpyWare by Characterizing Their General Behavio
#1


Prepared by:
Muhammad Samiullah Khan

Abstract

Spywares are computer programs, that are installed(surreptitiously) on computer systems without the knowledge of user of that system, monitor the user behaviorand leak out the secret information. Currently to overcome this problem, antispyware programs are used. But most of these antispyware programs work on similar traditional methodology as antivirus programs i.e. signatures of program is scanned and are compared to signatures of some known spyware programs. If signature of program are same as known spyware program signature, this program is declared as spyware program, and is treated as required. Drawback of this traditional technique is that antispyware programs can easily be deceived by some obfuscation transformation(applied on spyware programs).

This paper presents more sophisticated technique to detect spywares. If we study the general behavior of spywares, we can easily detect any type of spyware. we will restrict our explanation to a class of spywares, that are implemented as Browser Helper Objects(BHOs) and toolbars, for internet explorer to monitor the user behaviour.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar on spyware and trojan horse, general topic in, powered by phpbb general, general projects**advantages**ipad**owered by fluxbb pandora charms, efficient iris recognition by characterizing key local variations at vbnet, general system layering seminar, powered by vbulletin general motors timeline,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 31,255 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,408 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,123 15-04-2016, 08:04 PM
Last Post: knagpur
  General Packet Radio Service (Download Full Seminar Report) Computer Science Clay 10 15,751 22-03-2014, 12:46 PM
Last Post: MichaelPn
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,364 22-07-2013, 11:44 AM
Last Post: computer topic
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,764 01-03-2013, 11:58 AM
Last Post: [email protected]
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,142 29-11-2012, 12:56 PM
Last Post: seminar details
  A Seminar Report On INTRUSION DETECTION SYSTEM Computer Science Clay 1 5,763 23-11-2012, 01:13 PM
Last Post: seminar details
  Image Edge Detection based on FPGA seminar class 1 3,977 18-10-2012, 11:43 AM
Last Post: seminar details

Forum Jump: