Anti-spyware Security Design Patterns

被引:2
|
作者
Sheta, Mohamed Adel [1 ]
El Hadad, Kamel Abd El Salam [1 ]
Aboelseoud, H. M. [1 ]
Zaki, Mohamed [2 ]
机构
[1] Mil Tech Coll, Dept Comp Engn, Cairo, Egypt
[2] Al Azhar Univ, Dept Syst & Comp Engn, Cairo, Egypt
关键词
Spyware; Security Design Patterns;
D O I
10.1109/IMCCC.2016.202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spyware is deemed a big danger to the privacy and secrecy of both individuals and firms; it frequently results in the damage and loss of electronic data stored on all types of computers. The main challenges in designing anti-spyware systems are the need for updating data describing spywares and changing the structure of old programs to detect new or unknown spywares. In this paper, we aimed to propose a security pattern for spyware detection. We achieved our objective by introducing a framework for anti-spyware system that combine data mining and design patterns in creating security patterns able to detect and classify spyware efficiently. The proposed anti-spyware system is characterized by its reusability, in sense that it can modify itself for any new or unknown spyware. The experimental results of the proposed approach outperform all the previous competing approaches.
引用
收藏
页码:465 / 470
页数:6
相关论文
共 50 条
  • [41] Anti-Patterns in Evolutionary Design of SOA Research
    Zhao Qing
    Liu Yu-yan
    Jie Yong-gang
    Yue Qiang
    [J]. 12TH ANNUAL MEETING OF CHINA ASSOCIATION FOR SCIENCE AND TECHNOLOGY ON INFORMATION AND COMMUNICATION TECHNOLOGY AND SMART GRID, 2010, : 345 - 348
  • [42] ACDPR: A Recommendation System for the Creational Design Patterns Using Anti-patterns
    Nahar, Nadia
    Sakib, Kazi
    [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 4, 2016, : 4 - 7
  • [43] Security Patterns 2.0 Towards Security Patterns Based on Security Building Blocks
    van den Berghe, Alexander
    Yskout, Koen
    Joosen, Wouter
    [J]. 2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SECURITY AWARENESS FROM DESIGN TO DEPLOYMENT (SEAD), 2018, : 45 - 48
  • [44] Security Patterns
    Markus Schumacher
    [J]. Informatik-Spektrum, 2002, 25 (3) : 220 - 223
  • [45] Safe Design Real-time Embedded Systems with Security Patterns
    Ben Mansour, Ahmed
    Naija, Mohamed
    Ben Ahmed, Samir
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE), 2019, : 459 - 463
  • [46] SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems
    Nguyen, Phu H.
    Yskout, Koen
    Heyman, Thomas
    Klein, Jacques
    Scandariato, Riccardo
    Le Traon, Yves
    [J]. 2015 ACM/IEEE 18TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS), 2015, : 246 - 255
  • [47] Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Cheng, Feng
    Meinel, Christoph
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, : 90 - 97
  • [48] Supporting Secure Business Process Design via Security Process Patterns
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2017 AND EMMSAD 2017, 2017, 287 : 19 - 33
  • [49] A catalogue associating security patterns and attack steps to design secure applications
    Salva, Sebastien
    Regainia, Loukmen
    [J]. JOURNAL OF COMPUTER SECURITY, 2019, 27 (01) : 49 - 74