Download presentation
Presentation is loading. Please wait.
Published byEstella Elliott Modified over 9 years ago
1
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs 1
2
Overview What is Spyware? Why do we care? (The Overall Issues) What do we do about it? (The Anti-Spyware Remedies) The Spyware Tests Conducted: Experiments & Results Conclusion 2
3
So what is Spyware? There are many types of components: Adware Dialers Joke Programs Hack Tools Remote Access Programs Spy Programs 3
4
Adware Mainly pop-up programs that gather important information about computer usage through internet browser Employed by people trying to make money from directed spam and advertisement Example is: Adware.WinFavorites – Checks your favorites and sends pop ups that are related 4
5
Dialer Typical program that takes over a computer modem and dials to locations without a user’s consent Usually meant to increase the user’s phone bill Places itself as high speed connection’s replace dial up Example: XXXDial –Dials international location to deliver pornographic content to a person’s computer 5
6
Joke Programs Usually meant as a distraction or nuisance to interrupt work Usually not malicious or harmful Made by people that just want to show how they can get in a system if they wanted to Example: Joke.Win32.DesktopPuzzle –Turns your desktop into a slider puzzle 6
7
Hack Tools 2 Kinds -Keystroke Loggers -Distributed denial of service attacks Very Malicious Used to steal personal information, bank accounts or passwords Also can help to take over a computer to be used to attack another computer 7
8
Hack Tools Those that use them are trying to do identity theft or use computer resources to attack other networks (this is a service many hackers pay for) Example: Haxdoor.o –Opens port 1661 on the computer and allows full access to others later can use it Example: KeySpy –Keystroke logger that records all keystrokes and emails it to an email 8
9
Remote Access Programs Back Door Programs Makes it easier for access to be gained at future times when it is needed Can be used to have other programs like hack tools installed Example: MindControl –Opens port 23 to allow full control over a computer 9
10
Spy Programs Can scan and monitor system illegally Used to assist in identity theft Also can be a keystroke logger that transmits its information whenever a secure webpage is accessed Example: Realtime-Spy – Implicit scanner & keystroke logger that records personal passwords and transmits to a remote account 10
11
The Real Bad Guys Spy Programs Hack Tools Remote Access Programs Allow easier access to the infected computer at a later date Used to take over an infected computer and use its resources for their own purposes 11
12
Spyware Threats/Issues Increasing variants & becoming very prevalent Way to make cheap and easy money Targeting all internet users; using your resources & making money from you If you are not cautious, then you may get exploited Some spyware can really harm you and infect your computer very badly 12
13
What To Do? (Remedies) Use spyware removal software (AntiSpyware) Edit the registry Find and remove the spyware program Reformat the hard drive (extreme case) Back-up & restore Prevention – Never go online (impractical solution) – Firewalls – Employ spyware detection programs 13
14
The Anti-Spyware Tests Experimental Procedure –Decided to test what spyware removal and prevention tools were the best –Infected a computer with spyware in a controlled environment (test bed) –Conducted multiple test runs to see performance of each tool Efficiency & effectiveness of a tool based on priority factors -spyware detection capabilities -speed (response time) -space (storage) requirements -system compatibility, cost, availability 14
15
The Anti-Spyware Tests Results: Tool Features Comparison Found out that none were really full-proof (none can detect all spyware and remove everything) It is better to use two or more anti-spyware tools in combination, as one will often detect and remove things that others do not 15
16
Recommended Anti-Spyware The best programs were (according to our experiments): Ad-aware Pest Patrol Webroot Spyware Sweeper Spybot Search and Destroy McAfee Anti Spyware (Security Center Package) Microsoft Anti-Spyware Beta (Windows Defender) 16
17
Conclusions Spyware programs can prove to be quite difficult to remove, even for dedicated anti- spyware scanners; detecting, disabling or deleting the spyware completely is an arduous and next to impossible task No single anti-spyware scanner tool removes everything; even the best- performing anti-spyware scanner in test runs missed one quarter of the "critical" files and registry entries 17
18
Conclusions This means that the programs were at best 75% effective, in reality Prevention is always preferable to scanning and removal Moreover, users should learn to practice safe computing habits, which include avoiding web sites and programs of unknown or dubious provenance and carefully reading End User License Agreements and Privacy Policies 18
19
References Spyware Test: http://www.spywarewarrior.com/ Spyware Definitions: http://securityresponse.symantec. com/avcenter/refa.html#spyware Spyware Listings: http://www.spywareguide.com/ 19
20
20
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.