SOFTWARE PRODUCT FOR SEARCHING AND DETECTING SPYWARE-TYPE PROGRAMS
DOI:
https://doi.org/10.18372/2410-7840.24.16862Keywords:
Spyware, malware, software, scanner, keylogger, WindowsAbstract
To date, the availability of high-quality antivirus software in the system cannot fully guarantee that the user's personal information will not fall into the wrong hands. Despite the fact that the methods of searching for and clearing potentially dangerous software codes are updated daily, there is a category of programs that the operating system does not regard as a threat, since programs of this type do not always aim to damage and/or destroy information that is valuable to the user. We are talking about so-called spyware. The main feature of such programs is that they use standard methods used by a number of other programs to collect information from the system. This means that they can not only collect, process and transmit the collected data to third parties, but also remain invisible to both the user and the security software. In this paper, we considered the problems of spyware-type programs, the features of their operation and detection. The system monitor subtype of spyware was described in more detail. In the Microsoft Visual Studio C # programming environment, a software product was developed to scan the system for programs that could potentially collect, process, and transmit user information without the latter's knowledge. The methods and functions that this program uses to search for spyware in the system were described.
References
Ковальов О.О., Чобаль О.І., Різак В.М. Програмний продукт типу spyware та аналіз його стійкості до виявлення засобами захисту // Захист інформації. Том 22, №3. 2020.
Prateek Nigam "Malware Detection and Signature Generation" International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020.
Yan, Y. Qi and Q. Rao, "Detecting malware with an ensemble method based on deep neural network", Secur. Commun. Netw., vol. 2018, Mar. 2018.
Efraim TurbanJon OutlandDavid KingJae Kyu LeeTing-Peng LiangDeborrah C. Turban "Marketing and Advertising in E-Commerce" 13 October 2017;
Anthony Ekanem "Adware and Spyware: How to Remove and Protect Your Computer against Adware and Spyware Paperback" March 17, 2016 70 pages.
P. Wang and Y.-S. Wang, "Malware behavioural detection and vaccine development by using a support vector model classifier", J. Comput. Syst. Sci., vol. 81, no. 6, 2015.
R. Islam, R. Tian, L. M. Batten and S. Versteeg, "Classification of malware based on integrated static and dynamic features", J. Netw. Comput. Appl., vol. 36, no. 2, 2013.
Ladakis E., Koromilas L., Vasiliadis G., Polychronakis M., Ioannidis S. "You Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger." In Proceedings of the 6th European Workshop on System Security. EuroSec, Prague, Czech Republic, April 2013.
Steven D. Gribble Alexander Moshchuk, Tanya Bragin and Henry M. Levy. A CrawlerBased Study of Spyware on the Web. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2006.
Saroiu, S., Gribble, S., Levy, H. Measurement and Analysis of Spyware in a University Environment. In Usenix NSDI (2004).
Christodorescu, M., Jha, S. Testing Malware Detectors. In ACM International Symposium on Software Testing and Analysis (ISSTA) (2004);
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).