Spyware Detection Using Data Mining
Prof. Mahendra Patil
Atharva College Of Engineering
Head Of Department(CS)
2nd line of address onlymahendra7@yahoo.com Karishma A. Pandey
Atharva College Of Engineering
1st line of address
2nd line of address pandeykarishma5@gmail.com Madhura Naik
Atharva College Of Engineering
1st line of address
2nd line of address madhura264@gmail.com
Junaid Qamar
Atharva College Of Engineering
1st line of address
2nd line of address junaiddgreat@gmail.com ABSTRACT
Malicious programs have been a serious threat for confidentiality, integrity and availability of a system. A new category of malicious programs has gained momentum called Spyware. Spyware are more dangerous for confidentiality of private
…show more content…
Keywords
Malicious Code, Feature Extraction, N-Gram, ARFF (Attribute Relation File Format), CFBE (Common Feature-based Extraction), FBFE (Frequency-based Feature Extraction).
1. INTRODUCTION
Often, spyware is difficult to remove without detailed knowledge of how it works or by taking drastic measures such as wiping the system clean and starting over. In many cases, verifying the integrity of the system requires the operating system, patches, and applications to be reinstalled. These difficulties, combined with the efforts necessary to recover user data, can take a lot of time.
2. DEFINITION
Federal Trade Commission Staff Report in USA defines spyware as:
"Software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge"[1].
3.
…show more content…
People often use the same username and password for many different systems, so these stolen credentials may be used to access other systems not yet infected. Once access is gained, additional information theft or malware installation can take place. Another way spyware puts systems at future risk is by installing backdoor access mechanisms. These backdoors give the malware operator access to control the system or to command the system to download and run arbitrary applications. Attackers can build vast collections of compromised systems without originally compromising a single
Detection phase After obtaining the parameters, HsMM could be used to check whether the given observation sequences of SNMP-MIB variables correspond to normal profile or bot profile by calculating their average log likelihoods. The forward-backward algorithm is used to calculate a sequence’s likelihood against a given model. ALL values of training sequences for the normal and botnet systems are computed. If the observation sequence’s ALL value lies in a particular confidence interval, then it will be considered as normal profile. Similarly confidence interval for botnets is identified.
Worse, they cannot see if the user 's machine already contains malware such as keystroke loggers, frame grabbers or Trojans. They also cannot see or manage stored information such as the end users ' cache, cookies, password store and browser history. Data can remain in the web browser cache in clear text format, where it can be easily extracted by either malware or end users. Even simple, everyday tasks, such as cut, copy, paste and screen capture, put sensitive data in the system-wide clipboard, also rendered in clear text format and easily accessible even after the web session has ended. In addition, stored user names and passwords from browser sessions remain available in the authentication cache and are therefore vulnerable to
This can help delete all the malware or malicious content on the computer’s system. This can be the only way to save a computer at times, for example if the memory storage has been filled up with worms that keep copying themselves until the system stops responding. If this is the case then deleting everything can be the easiest way to stop. Other times, the malware is not visible to the user allowing it to travel through the system’s hard drive and damage the files. It can also be disguised as useful files.
Should parents have the right to put spyware on their children computers. Harlan Coben the author of “ Undercover Parent ” published by the New York Times on March 16, 2008 highlights the fact that it's scary to put spyware on your your children computers, Most parents won't even consider it. From my point of view with Cobens argument because most parents don't know what they're really do on the internet. Coben speaks about how some people will say that it's better just to use parental blocks that denies access to inappropriate sites.
United States v. Lopez was the first United States Supreme Court case since the New Deal to set limits to Congress's power under the Commerce Clause of the United States Constitution. The issue of the case was that It exceeded to the power of Congress which had no say over it because the case had nothing to do with commerce or any sort of economic activity. The case United States v. Lopez involved Alfonzo Lopez Jr., Supreme Court Justice William H. Rehnquist, and Congress. Unites States v. Lopez was about a 12th grader named
In addition, the Computer Misuse Act 1990 recognises following offences, which leads to new offences of unauthorized access with the intention of committing a crime. This can lead to a person being guilty of causing a computer to perform any intent of having the secure access of any program/data held in the computer they are accessing.
Is privacy really important?Do kids have a choice?According to Harlan Coben teens and kids who have access to the internet should be monitored by parents or by spyware. I agree with Mr.Coben because we should know what teens or kids of today go on while not being monitored. Parents should monitor their kids use of the internet even with spyware. I think spyware is a good thing to be used on kids. According to Harlan Coben ignoring your kid is negligence cause then that shows your kid that they could do or go on anything without being caught.
They will also probably not have enough time on their hands to evade spyware. Another argument that many agree with is that spyware invades privacy and breaks trust. This only becomes apparent because of how accessible it is for parents to invade their children’s private conversations. Though, with respectful parents, they will only use spyware to protect their children and not to invade their privacy. Parents should allow and trust their children to chat with their friends, without eavesdropping on the conversation.
To the Editor: In the essay “The Undercover Parent” by Harlan Coben, the author calls the spyware on a child’s computer as “loving parents...doing the surveillance” and “not faceless bureaucrats” as a way to defend. But speaking as a person, who just quite recently went through those teenage years, I may not understand the perspective of a parent nor do I claim to. However, I do understand the big difference between Dick Cheney and a member of my family reading my messages but it doesn’t make the wound sting less. The government did it as a way of national defence, yet a lot of people felt like they were being violated; now having a parent download a spyware - that in most cases is meant for protection and hopefully the prevention of something
Certain applications here at First World Bank Savings and Loan are mission-critical for our organization, we will want to monitor appropriate security lists maintained by their sponsoring groups. Linux has antivirus and anti-malware systems. Some of these systems are designed to minimize the risk of Linux as a malware carrier between Microsoft systems. But such systems also address malware written for Linux, such as rootkits, Trojan horses, worms, and more.
1. [100 pts] Refer to the Chapter 3 of DHS IT Security Essential Body of Knowledge Main Text (See DHS EBK_MainText_nps36-010708-07.pdf in Resources folder). Pick ONE competency area from EBK (data security, digital forensics, risk management, etc.) and provide the definition of each key term listed under that competency area. You can use the definitions provided in the textbook or search them from other sources. I have chosen the digital forensics competency area and the definition of each key terms as listed in the textbook are as follows:
1. Viruses Can destroy all of the data and erase all of the file or misused by the attacker. Have the anti-virus downloaded in your computer and make sure your computer is completely updated. 2. Phishing Attacker will be able to get the private information of the person and will gain access on computer Be able to recognize the fake emails from the attacker and avoid opening them up.
Coben supports his thesis by claiming stating that the internet is a dangerous place, expressing that monitoring children can prevent bad situations, stating that the internet isn’t a totally private, and explaining it’s a parents responsibility to monitor their children. Coben makes many strong and good points in his article which makes me agree with his position on spyware. In his article, Coben explains a reason to
Cyber criminals use the information they collect from a victims online platforms to illegally gain access to the victims bank account and credit cards. These criminals later use this information to steal money from the victim's accounts or take loans using the victim's name (Lai, Li, & Hsieh, 2012). Driver's license identity theft: Criminals use the information they obtain from victims social media platforms to steal or forge drivers licenses that have the victim's name. They then use these stolen licenses when they are caught thus implicating the victim in a crime he was not aware
Technology is growing at a fast pace and every day we see a new product or service that is available. Many times it is hard to even keep up with the latest phone, computer, game console, or software. There are so many different gadgets to choose from and even the internet is on information overload. As a result, we can no longer truly expect to have privacy.