Detection and Avoidance of SpyWare by Characterizing Their General Behavio
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
07-10-2010, 11:57 AM

Prepared by:
Muhammad Samiullah Khan


Spywares are computer programs, that are installed(surreptitiously) on computer systems without the knowledge of user of that system, monitor the user behaviorand leak out the secret information. Currently to overcome this problem, antispyware programs are used. But most of these antispyware programs work on similar traditional methodology as antivirus programs i.e. signatures of program is scanned and are compared to signatures of some known spyware programs. If signature of program are same as known spyware program signature, this program is declared as spyware program, and is treated as required. Drawback of this traditional technique is that antispyware programs can easily be deceived by some obfuscation transformation(applied on spyware programs).

This paper presents more sophisticated technique to detect spywares. If we study the general behavior of spywares, we can easily detect any type of spyware. we will restrict our explanation to a class of spywares, that are implemented as Browser Helper Objects(BHOs) and toolbars, for internet explorer to monitor the user behaviour.

Attached Files
.pdf   my research paper.pdf (Size: 35.77 KB / Downloads: 63)

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,400 26-08-2015, 12:37 AM
Last Post: Leenas
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  analysis on credit card fraud detection methods ppt jaseelati 0 154 22-01-2015, 02:45 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 298 10-01-2015, 01:34 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 148 09-01-2015, 02:41 PM
Last Post: jaseelati
  credit card fraud detection ppt jaseelati 0 197 27-12-2014, 01:11 PM
Last Post: jaseelati
Lightbulb Fraud detection system for card transactions ffffff123456 0 395 26-04-2014, 05:19 AM
Last Post: ffffff123456
  General Packet Radio Service (Download Full Seminar Report) Computer Science Clay 17 11,711 21-03-2014, 05:30 AM
Last Post: MichaelKa
  Intrusion Detection: An Energy Efficient Approach in Heterogeneous WSN pdf study tips 1 949 09-02-2014, 05:40 PM
Last Post: Guest
  Design of an Error Detection and Data Recovery Architecture for Motion Estimation seminar projects maker 0 769 30-09-2013, 04:40 PM
Last Post: seminar projects maker