Abstract:
Malware can be used to gain access to a remote computer, for obtaining confidential information from the computer and to monitor system activity. It can be used to bypass the security measures of systems deployed by governments and large organizations, and gain access to valuable resources.
One such type is spyware that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. The attackers may use compromised computers for purposes such as installing malicious software (key-logger), taking system snapshots (screen-logger), secretly accessing the webcam (webcam-logger) and stealing valuable user credentials.
These malware attacks can be identified and prevented by using intrusion-detection systems which inspect the system activities for unauthorized requests and malicious activities.
To help secure our system from the threat of spyware, we have developed efficient anti-malware software that monitors system activities, and checks for any abnormal behavior or disruption in normal service routines. Its primary operation is to monitor incoming requests to the kernel, and identify any anomalous activity in the system. The software screens service calls made to the kernel, and determines whether data is being relayed without the authorization of the user.
The software has a user-friendly interface. If any malware threat is detected, the software triggers a notification to the user, identifying the threat and its source. The complexity of the results being displayed is low, and the user can easily comprehend the cause and implied-effect of the identified malware.