Delivery Methods of Spyware and its Counter Measures: A Review

Authors

  • Rajiv Makwana  M.Tech, Department of IT & Telecommunication, Raksha Shakti University, Ahmedabad, Gujarat, India
  • Ravi Sheth  Asst. Professor, Department of IT & Telecommunication, Raksha Shakti University, Ahmedabad, Gujarat, India

Keywords:

Spyware, Trojan horse, Ransomware, Ad-ware, Virus, Rootkit, Worm, Crypter, Active X

Abstract

Malware became the major issue for the industry and everyday new samples come ups with different method and technology. Each day the anti-virus industries collects the new malware and the job of security expert becomes more challenging. This paper will briefly introduce malware types and emphasis on the spyware which is not so harmful but performing crucial part as loader for other malwares for getting into system to perform malicious and dangerous activities.

References

  1. https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it
  2. http://www.pctools.com/security-news/what-is-a-rootkit-virus/
  3. https://usa.kaspersky.com/resource-center/threats/trojans
  4. https://www.avast.com/c-ransomware
  5. https://www.avg.com/en/signal/what-is-adware
  6. https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html
  7. https://www.kaspersky.co.in/resource-center/threats/viruses-worms
  8. https://blog.malwarebytes.com/threat-analysis/2015/12/malware-crypters-the-deceptive-first-layer/
  9. https://www.kaspersky.co.in/resource-center/threats/spyware
  10. https://www.cyber.nj.gov/threat-profiles/trojan-variants/pony
  11. http://www.spywareguide.com/spydet_599_coolwebsearch.html
  12. http://www.computerweekly.com/news/1280093514/Zeus-v3-Trojan-draining-more-than-675000-from-UK-bank
  13. https://look2me-remover.en.softonic.com/
  14. https://www.symantec.com/avcenter/reference/techniques.of.adware.and.spyware.pdf
  15. http://how-does-things-work.blogspot.in/2010/01/working-of-spyware.html

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Rajiv Makwana, Ravi Sheth, " Delivery Methods of Spyware and its Counter Measures: A Review, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.988-991, November-December-2017.