Spyware Detection Techniques

Abstract

 Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the study of spywares.

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

 Vehicle Security and Accident Information System

 The main aim of this project is to offer an advance security system in CAR, which consists of a face detection subsystem, a GPS module, a GSM module and a control platform. The face detection subsystem can detect...

SKIN TONE BASED IMAGE STEGANOGRAPHY USING PARTICLE SWARM OPTIMIZATION

In data communication field, security problems become an essential issue. Steganography is the art of hiding the actual data in another transmission medium to obtain secret communication. It does not replace the cryptog...

 MICROSRTIP LINE BANDPASS UWB FILTER USING MMR AND APERTURE AT GROUND

 Parallel coupled band pass filter is proposed for UWB applications using MMR. For better performance defected ground is proposed. firstly designed a PCML band pass filter with MMR at the center frequency of 6.85GH...

 THE PRODUCTION OF BIODIESEL BY TRANSESTERIFICATION PROCESS OF SUNFLOWER OILS AND ETHANOL, USING ALKALI CATALYST

 The transesterification reaction of sunflower oil with ethanol in presence of alkaline catalyst sodium hydroxide was studied. The effect of mass ratio of ethanol to oil, the mass ratio of catalyst to oil and react...

 Study of Wear Characteristics of AISI H11 Steel

 In metal casting and forming industries, the wear of dies continues to be a great concern to the automotive industry due to increasing die maintenance cost and scrap rate. The demand to reduce the use of lubricant...

Download PDF file
  • EP ID EP122511
  • DOI -
  • Views 69
  • Downloads 0

How To Cite

Ankur Singh Bist (30).  Spyware Detection Techniques. International Journal of Engineering Sciences & Research Technology, 3(2), 780-782. https://europub.co.uk/articles/-A-122511