{"title":"Hunter: windows操作系统的反间谍软件","authors":"N. Arastouie, M. Razzazi","doi":"10.1109/ICTTA.2008.4530281","DOIUrl":null,"url":null,"abstract":"Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Hunter: An Anti spyware for windows Operating System\",\"authors\":\"N. Arastouie, M. Razzazi\",\"doi\":\"10.1109/ICTTA.2008.4530281\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.\",\"PeriodicalId\":330215,\"journal\":{\"name\":\"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications\",\"volume\":\"2012 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTTA.2008.4530281\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTTA.2008.4530281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hunter: An Anti spyware for windows Operating System
Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.