The Solution Write a spyware detection program that does not use a reference list. Instead, find spyware using tests that look for files that exhibit traits.

Slides:



Advertisements
Similar presentations
Operating-System Structures
Advertisements

Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Linux device-driver issues
Lectures on File Management
© Vera Castleman Software Grade 10. What is software? A program is a collection of instructions to do a job. Programs are collectively known as SOFTWARE.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Operating System Security : David Phillips A Study of Windows Rootkits.
Explanations Of Software Utilities By Tim Wong.
Operating Systems Simulator Jessica Craddock Kelvin Whyms CPSC 410.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Basic Unix Dr Tim Cutts Team Leader Systems Support Group Infrastructure Management Team.
Command Console Tutorial BCIS 3680 Enterprise Programming.
UNIX By Darcy Tatlock. 1. Successful Log Into Unix To actively manipulate your website you need to be logged in. Without being logged in you cannot enter.
Linux Files and Directories. Linux directories Linux system are arranged in what is called a hierarchical directory structure. This means that they are.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Computer Information Technology – Section 2-4. Objectives The Student will Understand the basic system tools and how to use them Understand virus and.
1 Chapter One A First Program Using C#. 2 Objectives Learn about programming tasks Learn object-oriented programming concepts Learn about the C# programming.
Va-scanCopyright 2002, Marchany Unit 6 – Solaris File Security Randy Marchany VA Tech Computing Center.
Unix Primer. Unix Shell The shell is a command programming language that provides an interface to the UNIX operating system. The shell is a “regular”
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
Hacker Zombie Computer Reflectors Target.
Basic Computer Cleanup Larry James ResNet Manager.
Lecturer: Ghadah Aldehim
JavaScript, Fourth Edition
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Z-Town Technical Details Ben Trivett, Drew Switzer, Cameron Jett, Ryan Southard Department of Computer Science and Engineering The Ohio State University.
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Module 2.4 Computer management 1. Contents Initial maintenance Setting up accounts Configuring the desktop Security settings Ongoing maintenance Adding.
Computer Information Technology – Section 2-4. Objectives The Student will Understand the basic system tools and how to use them Understand virus and.
The Internet 8th Edition Tutorial 4 Searching the Web.
Agenda Link of the week Use of Virtual Machine Review week one lab assignment This week’s expected outcomes Review next lab assignments Break Out Problems.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Virus Pattern Recognition Using Self-Organization Map.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
ECE450 - Software Engineering II1 ECE450 – Software Engineering II Today: Design Patterns VIII Chain of Responsibility, Strategy, State.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
 Registry itself is easy and straightforward in implementation  The objects of registry are actually complicated to store and manage  Objects of Registry.
Fall 2002CS 150: Intro. to Computing1 Streams and File I/O (That is, Input/Output) OR How you read data from files and write data to files.
Artificial Intelligence Lecture No. 26 Dr. Asad Ali Safi ​ Assistant Professor, Department of Computer Science, COMSATS Institute of Information Technology.
1.Nattawut Chaibuuranapankul M.2/6 No. 8 2.Poonnut Sovanpaiboon M.2/6 No.11 3.Sarin Jirasinvimol M.2/6 No Attadej Rujirawannakun M.2/6 No.28.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
The single most important skill for a computer programmer is problem solving Problem solving means the ability to formulate problems, think creatively.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
How to Fix Binkw32.dll Error
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Today… Strings: –String Methods Demo. Raising Exceptions. os Module Winter 2016CISC101 - Prof. McLeod1.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
For more information on Rouge, visit:
bitdefender virus protection
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
2.4 Cyber-Safety.
Spyware Detection Jeff Rosenberg Advisor: Professor Hemmendinger
Tonga Institute of Higher Education IT 141: Information Systems
Discovering Computers 2012: Chapter 8
How to fix “OMCDetect” error while using OverDrive for Windows 8 and 7
File Management.
Article Source:
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
2.4 Cyber-Safety.
Presentation transcript:

The Solution Write a spyware detection program that does not use a reference list. Instead, find spyware using tests that look for files that exhibit traits common to spyware programs. These traits include file size, name, type, location and creation date. This way, the program does not need to be constantly updated, and is not bound by what its creator has deemed spyware. The program scans a computer, testing all files and directories it encounters, and decides what files are spyware based on the tests that they pass. Some example directory tests No executable file except for the uninstall file No executable files, and a dll file with a similar name as the directory itself A lot of large dat files The Problem Most spyware detection tools work by using their own lists of known spyware programs. This means that anything not on this list will not be caught, including anything released since the last update, or programs that the maker of the tool has decided are not spyware. Testing Patterns look for certain traits in a file’s name, size and type. Each pattern has a code associated with it, so that when a file matches a pattern its own code reflects this. Pattern Code SizePattern 400, NamePattern “spy” TypePattern “exe” Tests are combinations of patterns that are common among spyware files. Each test has a code associated with it, which is the combination of the codes making up its patterns. Tests also have probabilities associated with them, and any time a file passes a given test its probability of being spyware is increased according to that test’s probability value. Test Code SpywareExe – looks for exe files with the word ‘spy’ in the name SmallExe – looks for exe files between 400 and 800 bytes Files can easily be tested by bitwise-anding their pattern codes (code for the patterns that file has passed) with each test’s code. If the result of this operation is the same as the test’s code, then the file has passed that test. Filename Size Pattern Code Pattern & SpywareExe Code Pattern & SmallExe Code Spyware.exe 2KB (PASS) (FAIL) kernel32.dll 450B (FAIL) (FAIL) Senior Project – Computer Science SPYWARE DETECTION Jeff Rosenberg Advisor: Professor Hemmendinger Spyware can cause an infected machine to look like this one. Lots of popup ads, unwanted toolbars and advertisements, and an internet connection so slow it is almost unusable. Program Interface Sometimes it is impossible to distinguish between what is spyware and what isn’t. So, the program gives the user the option to mark any detected files as ‘good,’ meaning they will be saved to a special list and never detected again. Files are removed by moving them to a special quarantine folder and appending some extra characters to their names. This way they cannot be executed as normal, since they won’t be able to be found. Files that are already running can’t be moved, so a special cleanup program is executed on the next restart to move and rename these files before they have a chance to start. A value is placed in the registry to tell the system to run the cleanup program the next time it restarts. Any number of files can be selected for removal or to be marked as not spyware. Future Work Learning - have the program adjust test parameters on the fly, in reaction to the user’s input. Also, have it create new tests based on new traits that it sees exhibited by spyware programs. Optimization – there is a lot of room for speed improvements in some of the algorithms used for searching. A computer can be searched starting from any root directory, with all the results displayed along with their probabilities of being spyware. Date Testing These files in C:\Windows\ system32\ were all created at the exact same time – a good indication of spyware. These other files in C:\Program Files\ are not part of a large cluster, but have the same creation date as those files above, another good indication of spyware.