Hunter: An Anti spyware for windows Operating System

N. Arastouie, M. Razzazi
{"title":"Hunter: An Anti spyware for windows Operating System","authors":"N. Arastouie, M. Razzazi","doi":"10.1109/ICTTA.2008.4530281","DOIUrl":null,"url":null,"abstract":"Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTTA.2008.4530281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Hunter: windows操作系统的反间谍软件
互联网正以极快的速度发展,这一新的人类现象正吸引着各种各样的人和组织的注意,吸引着积极或消极的目的。间谍软件,有不同的目的,收集人们的个人信息,而不让他们意识到这一点,并得到他们的许可。此类软件通常安装在个人电脑上,并开始收集信息,包括用户访问过的网站列表,并能够监控和检测通过键盘输入的信息,电子邮件地址和其他用户不打算传播的敏感或机密信息或更多机密信息,如ID和密码。之后,他们将这些信息发送到他们的主要间谍数据库。间谍软件正在给组织带来安全和政治风险和问题。在本文中,我们介绍了猎人的规范和体系结构,这是一个反间谍软件,我们开发的,使系统安全,以防止此类入侵间谍软件。这种软件的实现将分两个阶段进行描述。第一阶段是数据采集。我们获得了一个庞大的整个系统的过程信息数据库。这是通过考虑不同类型间谍软件的特征和操作来完成的。整个过程的信息都保存在数据库中,这样我们就可以通过观察主体的各个方面来达到最好的信任衡量标准。第二阶段是利用前一阶段开发的数据库进行间谍软件检测。间谍软件检测是完成三个程度的准确性:高,中,低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Weight based DSR for Mobile Ad Hoc Networks Remote Control and Overall Administration of Computer Networks, Using Short Message Service On the Performance of Matching MMPP to SRD and LRD Traffic Using Algorithm LAMBDA Large Scale Data Management in Grid Systems: a Survey Scheduling Multiple Concurrent Projects Using Shared Resources with Allocation Costs and Technical Constraints
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1