SOFTWARE PRODUCT FOR SEARCHING AND DETECTING SPYWARE-TYPE PROGRAMS

Authors

DOI:

https://doi.org/10.18372/2410-7840.24.16862

Keywords:

Spyware, malware, software, scanner, keylogger, Windows

Abstract

To date, the availability of high-quality antivirus software in the system cannot fully guarantee that the user's personal information will not fall into the wrong hands. Despite the fact that the methods of searching for and clearing potentially dangerous software codes are updated daily, there is a category of programs that the operating system does not regard as a threat, since programs of this type do not always aim to damage and/or destroy information that is valuable to the user. We are talking about so-called spyware. The main feature of such programs is that they use standard methods used by a number of other programs to collect information from the system. This means that they can not only collect, process and transmit the collected data to third parties, but also remain invisible to both the user and the security software. In this paper, we considered the problems of spyware-type programs, the features of their operation and detection. The system monitor subtype of spyware was described in more detail. In the Microsoft Visual Studio C # programming environment, a software product was developed to scan the system for programs that could potentially collect, process, and transmit user information without the latter's knowledge. The methods and functions that this program uses to search for spyware in the system were described.

References

Ковальов О.О., Чобаль О.І., Різак В.М. Програмний продукт типу spyware та аналіз його стійкості до виявлення засобами захисту // Захист інформації. Том 22, №3. 2020.

Prateek Nigam "Malware Detection and Signature Generation" International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020.

Yan, Y. Qi and Q. Rao, "Detecting malware with an ensemble method based on deep neural network", Secur. Commun. Netw., vol. 2018, Mar. 2018.

Efraim TurbanJon OutlandDavid KingJae Kyu LeeTing-Peng LiangDeborrah C. Turban "Marketing and Advertising in E-Commerce" 13 October 2017;

Anthony Ekanem "Adware and Spyware: How to Remove and Protect Your Computer against Adware and Spyware Paperback" March 17, 2016 70 pages.

P. Wang and Y.-S. Wang, "Malware behavioural detection and vaccine development by using a support vector model classifier", J. Comput. Syst. Sci., vol. 81, no. 6, 2015.

R. Islam, R. Tian, L. M. Batten and S. Versteeg, "Classification of malware based on integrated static and dynamic features", J. Netw. Comput. Appl., vol. 36, no. 2, 2013.

Ladakis E., Koromilas L., Vasiliadis G., Polychronakis M., Ioannidis S. "You Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger." In Proceedings of the 6th European Workshop on System Security. EuroSec, Prague, Czech Republic, April 2013.

Steven D. Gribble Alexander Moshchuk, Tanya Bragin and Henry M. Levy. A CrawlerBased Study of Spyware on the Web. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2006.

Saroiu, S., Gribble, S., Levy, H. Measurement and Analysis of Spyware in a University Environment. In Usenix NSDI (2004).

Christodorescu, M., Jha, S. Testing Malware Detectors. In ACM International Symposium on Software Testing and Analysis (ISSTA) (2004);

https://docs.microsoft.com.

Published

2022-10-11