Detection and Avoidance of SpyWare by Characterizing Their General Behavio
#1


Prepared by:
Muhammad Samiullah Khan

Abstract

Spywares are computer programs, that are installed(surreptitiously) on computer systems without the knowledge of user of that system, monitor the user behaviorand leak out the secret information. Currently to overcome this problem, antispyware programs are used. But most of these antispyware programs work on similar traditional methodology as antivirus programs i.e. signatures of program is scanned and are compared to signatures of some known spyware programs. If signature of program are same as known spyware program signature, this program is declared as spyware program, and is treated as required. Drawback of this traditional technique is that antispyware programs can easily be deceived by some obfuscation transformation(applied on spyware programs).

This paper presents more sophisticated technique to detect spywares. If we study the general behavior of spywares, we can easily detect any type of spyware. we will restrict our explanation to a class of spywares, that are implemented as Browser Helper Objects(BHOs) and toolbars, for internet explorer to monitor the user behaviour.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: general motors advanced technology, general reservation system presentation, who is aj on general, general education seneca, spyware and trojan horses seminar, spyware bot search and destroy, general,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 30,972 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,388 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,099 15-04-2016, 08:04 PM
Last Post: knagpur
  General Packet Radio Service (Download Full Seminar Report) Computer Science Clay 10 15,739 22-03-2014, 12:46 PM
Last Post: MichaelPn
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,351 22-07-2013, 11:44 AM
Last Post: computer topic
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,751 01-03-2013, 11:58 AM
Last Post: [email protected]
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,125 29-11-2012, 12:56 PM
Last Post: seminar details
  A Seminar Report On INTRUSION DETECTION SYSTEM Computer Science Clay 1 5,755 23-11-2012, 01:13 PM
Last Post: seminar details
  Image Edge Detection based on FPGA seminar class 1 3,968 18-10-2012, 11:43 AM
Last Post: seminar details

Forum Jump: