CFP last date
20 January 2025
Reseach Article

Design and Implementation of Anti Spyware System using Design Patterns

by Mohamed Adel Sheta, Mohamed Zaki, Kamel Abd El Salam El Hadad, H. Aboelseoud M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 2
Year of Publication: 2015
Authors: Mohamed Adel Sheta, Mohamed Zaki, Kamel Abd El Salam El Hadad, H. Aboelseoud M.
10.5120/ijca2015905244

Mohamed Adel Sheta, Mohamed Zaki, Kamel Abd El Salam El Hadad, H. Aboelseoud M. . Design and Implementation of Anti Spyware System using Design Patterns. International Journal of Computer Applications. 123, 2 ( August 2015), 9-13. DOI=10.5120/ijca2015905244

@article{ 10.5120/ijca2015905244,
author = { Mohamed Adel Sheta, Mohamed Zaki, Kamel Abd El Salam El Hadad, H. Aboelseoud M. },
title = { Design and Implementation of Anti Spyware System using Design Patterns },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 2 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number2/21930-2015905244/ },
doi = { 10.5120/ijca2015905244 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:36.909735+05:30
%A Mohamed Adel Sheta
%A Mohamed Zaki
%A Kamel Abd El Salam El Hadad
%A H. Aboelseoud M.
%T Design and Implementation of Anti Spyware System using Design Patterns
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 2
%P 9-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Spyware is considered as a great threat to confidentiality that it can cause loss of control over private data for computer users. This kind of threat might select some data and send it to another third party without the consent of the user. Spyware detection techniques have been presented traditionally by three approaches; signature, behavior and specification based detection techniques. These approaches were successful in detecting known spyware but it suffers from some drawbacks such as; the need for updating data describing the system behavior to detect new or unknown spywares, and the high level of false positive or false negative rate. Therefore, in this paper we introduce a proposed anti spyware system design and implementation using design patterns for detecting and classifying spyware. This proposed approach can be reusable and modifying itself for any new or unknown spyware.

References
  1. G. Padmavathi, and S. Divya “A Survey on Various Security Threats and Classification of Malware Attacks, Vulnerabilities and Detection Techniques”, The International Journal of Computer Science & Applications (TIJCSA), Vol. 2, pp. 66-72, India, 2013.
  2. Donghwi Lee, Won Hyung Park, and Kuinam J Kim “A Study on Analysis of Malicious Codes Similarity Using N-Gram and Vector Space Model”, IEEE International Conference on information and applications (ICISA), pp. 1-4, Republic of Korea, 2011.
  3. Jyoti Landage, and Wankhade “Malware and Malware Detection Techniques: A Survey”, International Journal of Engineering Research & Technology (IJERT), Vol. 2, pp. 61-68, India, 2013.
  4. Mohamad Fadli Zolkipli, and Aman Jantan “A Framework for Malware Detection Using Combination Technique and Signature Generation”, IEEE International Conference on Computer Research and Development, pp. 61-68, Malaysia, 2010.
  5. Raja Khurram Shazhad, Syed Imran Haider, and Niklas Lavesson “Detection of Spyware by Mining Executable Files”, IEEE International Conference on Availability, Reliability and Security (ARES), pp. 295-302, Sweden, 2010.
  6. Kai Huang, Yanfang Ye, and Qinshan Jiang “ISMCS: An Intelligent Instruction Sequence based Malware Categorization System”, IEEE International Conference of Anti-counterfeiting, Security, and Identification in Communication, pp. 509-501, China, 2010.
  7. Mohammad Wazid, Avita Katal, R.H. Goudar, D.P. Singh , and Asit Tyagi “A Framework for Detection and Prevention of Novel Keylogger Spyware Attacks”, IEEE International Conference on Intelligent Systems and Control (ISCO), pp. 433-438, India, 2012.
  8. Karan Sapra, Benafsh Husain, Richard Brooks, and Melissa Smith “Circumventing Keyloggers and Screendumps”, IEEE International Conference on Malicious and Unwanted Software, pp. 103-105, USA, 2013.
  9. Raihana Md Saidi, Siti Arpah Ahmad, Noorhayati Mohamed Noor, and Rozita Yunos “Windows Registry Analysis for Forensic Investigation”, IEEE International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), pp. 132-136, Malaysia, 2013.
  10. Raja Khurram Shahzad, Niklas Lavesson, and Henric Johnson “Accurate Adware Detection using Opcode Sequence Extraction”, IEEE International Conference on Availability, Reliability and Security (ARES), pp. 189-195, Czech Republic, 2011.
  11. Raja Khurram Shahzad and Niklas Lavesson “Detecting scareware by mining variable length instruction sequences”, IEEE International Conference on Information Security South Africa (ISSA), pp. 1-8, South Africa, 2011.
  12. E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Boston, Massachusetts, Addison-Wesley Longman Publishing Co., Inc., USA, 1995.
  13. Eric Freeman, Elisabeth Freeman, Bert Bates, and Kathy Sierra, Head First Design Patterns, O'Reilly Publishing Co., Inc., USA, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Spyware Design patterns