Detection and Avoidance of SpyWare by Characterizing Their General Behavio
#1


Prepared by:
Muhammad Samiullah Khan

Abstract

Spywares are computer programs, that are installed(surreptitiously) on computer systems without the knowledge of user of that system, monitor the user behaviorand leak out the secret information. Currently to overcome this problem, antispyware programs are used. But most of these antispyware programs work on similar traditional methodology as antivirus programs i.e. signatures of program is scanned and are compared to signatures of some known spyware programs. If signature of program are same as known spyware program signature, this program is declared as spyware program, and is treated as required. Drawback of this traditional technique is that antispyware programs can easily be deceived by some obfuscation transformation(applied on spyware programs).

This paper presents more sophisticated technique to detect spywares. If we study the general behavior of spywares, we can easily detect any type of spyware. we will restrict our explanation to a class of spywares, that are implemented as Browser Helper Objects(BHOs) and toolbars, for internet explorer to monitor the user behaviour.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: sample general impressions on a report, powered by mybb the general, a general seminar topic of bluetoothproject, powered by phpbb general, general information, marketing general projects, 1996 general elections,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 31,870 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,446 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,174 15-04-2016, 08:04 PM
Last Post: knagpur
  General Packet Radio Service (Download Full Seminar Report) Computer Science Clay 10 15,797 22-03-2014, 12:46 PM
Last Post: MichaelPn
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,411 22-07-2013, 11:44 AM
Last Post: computer topic
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,794 01-03-2013, 11:58 AM
Last Post: [email protected]
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,173 29-11-2012, 12:56 PM
Last Post: seminar details
  A Seminar Report On INTRUSION DETECTION SYSTEM Computer Science Clay 1 5,787 23-11-2012, 01:13 PM
Last Post: seminar details
  Image Edge Detection based on FPGA seminar class 1 3,995 18-10-2012, 11:43 AM
Last Post: seminar details

Forum Jump: