Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2011, Article ID 569829, 28 pages
http://dx.doi.org/10.1155/2011/569829
Research Article

Evaluating Grayware Characteristics and Risks

1Yahoo! Inc., Sunnyvale, CA 94089, USA
2Department of Mathematics, Guangxi University of Finance and Economics, Guangxi 530003, China
3Department of Mathematics, Florida State University, Tallahassee, FL 32306, USA
4Corporate Accounts, Shire Pharmaceuticals, Inc. Wayne, PA 19087, USA

Received 8 March 2011; Revised 22 June 2011; Accepted 28 June 2011

Academic Editor: Yueh M. Huang

Copyright © 2011 Zhongqiang Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Grayware, 2011, http://en.wikipedia.org/wiki/Grayware.
  2. N. Good, R. Dhamija, J. Grossklags et al., “Stopping spyware at the gate: a user study of privacy, notice and spyware,” in Proceedings of the Symposium on Usable Privacy and Security (SOUPS '05), vol. 93, pp. 43–52, 2005. View at Publisher · View at Google Scholar
  3. M. Warkentin, X. Luo, and G. F. Templeton, “A framework for spyware assessment,” Communications of the ACM, vol. 48, no. 8, pp. 79–84, 2005. View at Publisher · View at Google Scholar
  4. Tenebril, “Spyware: A Dangerous New Threat,” November 2005, http://www.tenebril.com/pdf/SpywareProfiling.pdf.
  5. Webroot Sofware, “Monitoring Software on Your PC: Spyware, Adware, and Other Software,” 2004,http://www.ftc.gov/os/comments/spyware/040521webrootsoftware.pdf.
  6. B. Edelman, “Claria's Misleading Installation Methods—Ezone.com,” 2005, http://www.benedelman.org/spyware/installations/ezone-claria/.
  7. N. F. Awad and K. Fitzgerald, “The deceptive behaviors that offend us most about spyware,” Communications of the ACM, vol. 48, no. 8, pp. 55–60, 2005. View at Publisher · View at Google Scholar
  8. T. F. Stafford and A. Urbaczewski, “Spyware: the ghost in the machine,” Communications of AIS, vol. 14, pp. 291–306, 2004. View at Google Scholar
  9. S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P. Chow, and R. W. C. Lui, “A generic anti-spyware solution by access control list at kernel level,” Journal of Systems and Software, vol. 75, no. 1-2, pp. 227–234, 2005. View at Publisher · View at Google Scholar
  10. I. You and K. Yim, “Malware obfuscation techniques: a brief survey,” in Proceedings of the International Conference on Broadband, Wireless Computing Communication and Applications, (BWCCA '10), pp. 297–300, IEEE, Fukuoka, Japan, 2010.
  11. Trend Micro, “Spyware/Grayware Encyclopedia,” April 2009, http://www.trendmicro.com/vinfo/grayware.
  12. EarthLink, “Most Dangerous Types Of Spyware Increasing, States SpyAudit Survey,” 2005, http://ir.earthlink.net/releasedetail.cfm?ReleaseID=249692.
  13. H. Lee, C. A. Christiansen, and B. E. Burke, “Worldwide Spyware 2004–2008 Forecast and Analysis: Security and System Management Sharing Nightmares,” 2004, http://www.idc.com/getdoc.jsp?containedId=32229.
  14. Osterman Research, “Survey on Messaging Issues,” 2005, http://www.ostermanresearch.com/results/orresults_2005-01.pdf.
  15. The Radicati Group, “Inc. Corporate Anti-Spyware Market, 2006–2010,” 2006, http://www.radicati.com/.
  16. E. Howes, “The Anatomy of a ‘Drive-by-Download’,” 2004, http://www.spywarewarrior.com/uiuc/dbd-anatomy.htm.
  17. D. J. Stang, “Internet Intruders: Spyware, Adware, Hijackers and Other Pests,” 2004, http://Research.PestPatrol.com.
  18. B. Edelman, “Threats Against Spyware Detectors, Removers, and Critics,” 2005, http://www.benedelman.org/spyware/threats.
  19. CNet, “Symantec Sued for Labeling Product ‘Adware’,” 2004, http://news.com.com/2100-1023 3-5293992.html.
  20. Federal Trade Commission, “Monitoring Software on Your PC: Spyware, Adware, and Other Software,” 2005, http://www.ftc.gov/os/comments/spyware/040521webrootsoftware.pdf.
  21. E. Howes, “The FTC Spyware Workshop: One Year Later,” April 2005, http://netfiles.uiuc.edu/ehowes/www.
  22. B. Edelman, “Advertisers Using WhenU.,” June 2004, http://www.benedelman.org/spyware/whenu-advertisers.
  23. B. Edelman, “How Google's Blogspot Helps Spread Unwanted Software,” 2005, http://www.benedelman.org/news/022205-1.html.
  24. B. Edelman, “More on Google's Role: Syndicated Ads Shown Through Ill-Gotten Third-Party Toolbars,” 2005, http://www.benedelman.org/news/060605-1.html.
  25. R. K. Shazhad, S. I. Haider, and N. Lavesson, “Detection of spyware by mining executable files,” in Proceedings of the 5th International Conference on Availability, Reliability, and Security (ARES '10), pp. 295–302, 2010. View at Publisher · View at Google Scholar
  26. V. N. Vapnik, The Nature of Statistical Learning Theory: Information Science and Statistics, Springer, New York, NY, USA, 1999.
  27. G. Forman, “An extensive empirical study of feature selection metrics for text classification,” Journal of Machine Learning Research, vol. 3, pp. 1289––1305, 2003. View at Google Scholar
  28. T. Kohonen, Self-Organizing Maps, Springer, Berlin, Germany, 2000.
  29. T. Joachims, “A support vector method for multivariate performance measures,” in Proceedings of the International Conference on Machine Learning (ICML '05), pp. 377–384, ACM Press, 2005.
  30. G. Goth, “Spyware: Menace, Nuisance, or Both?” IEEE Security & Privacy, vol. 1, no. 3, pp. 10––11, 2003. View at Google Scholar
  31. D. T. Gilbert, C. K. Morewedge, J. L. Risen, and T. D. Wilson, “Looking forward to looking backward: The misprediction of regret,” Psychological Science, vol. 15, no. 5, pp. 346–350, 2004. View at Publisher · View at Google Scholar · View at PubMed
  32. Computer Associates, “Spyware Encyclopedia,” August 2011, http://gsa.ca.com/pest/browse.aspx.
  33. P. J. Bruening and M. Steffen, “Spyware: technologies, issues, and policy proposals,” Journal of Internet Law, vol. 7, no. 9, pp. 3––8, 2004. View at Google Scholar
  34. U. Lindqvist and E. Jonsson, “How to Systematically Classify Computer Security Intrusions,” in Proceedings of the 1997 IEEE Symposium on Security & Privacy, pp. 154––163, IEEE Computer Society Press, Oakland, Calif, USA, 1997.
  35. M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan, “Synthesizing near-optimal malware specifications from suspicious behaviors,” in Proceedings of the 31st IEEE Symposium on Security and Privacy, pp. 45–60, 2010. View at Publisher · View at Google Scholar
  36. D. Babic, D. Reynaud, and D. Song, “Malware analysis with tree automata inference,” in Proceedings of the 23rd International Conference on Computer Aided Verification, Springer, Snowbird, Utah, USA, July 2011.
  37. T. Lee and J. Mody, “Behavioral Classification,” in Proceedings of the EICAR Conference, pp. 1––17, 2006. View at Google Scholar
  38. L. L. DeLooze, “Classification of computer attacks using a self-organizing map,” in Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC, pp. 365–369, 2004.
  39. H. S. Venter, J. H. P. Eloff, and Y. L. Li, “Standardising vulnerability categories,” Computers and Security, vol. 27, no. 3-4, pp. 71–83, 2008. View at Publisher · View at Google Scholar
  40. B. Schoelkopf and A. J. Smola, Learning with Kernels, MIT Press, Cambridge, Mass, USA, 2002.
  41. C. J. C. Burges, “A tutorial on support vector machines for pattern recognition,” Data Mining and Knowledge Discovery, vol. 2, no. 2, pp. 121–167, 1998. View at Google Scholar
  42. T. Joachims, “Making large-scale support vector machine learning practical,” in Advances in Kernel Methods—Support Vector Learning, B. Schoelkopf, C. Burges, and A. Smola, Eds., chapter 11, pp. 169––184, MIT Press, Cambridge, Mass, USA, 1999. View at Google Scholar
  43. R. Collobert and S. Bengio, “SVMTorch: Support Vector Machines for large-scale regression problems,” Journal of Machine Learning Research, vol. 1, no. 2, pp. 143–160, 2001. View at Google Scholar
  44. J. C. Platt, “Fast training of Support Vector Machines using sequential minimal optimization,” in Advances in Kernel Methods—Support Vector Learning, B. Sch.olkopf, C. Burges, and A. Smola, Eds., chapter 12, MIT Press, 1999. View at Google Scholar
  45. S. S. Keerthi and D. Decoste, “A modified finite Newton method for fast solution of large scale linear SVMs,” Journal of Machine Learning Research, vol. 6, 2005. View at Google Scholar
  46. E. L. Allwein, R. E. Schapire, and Y. Singer, “Reducing multiclass to binary: a unifying approach for margin classifiers,” Journal of Machine Learning Research, vol. 1, no. 2, pp. 113–141, 2001. View at Google Scholar
  47. T. Hastie and R. Tibshirani, “Classification by pairwise coupling,” Annals of Statistics, vol. 26, no. 2, pp. 451–471, 1998. View at Google Scholar
  48. T. G. Dietterich and G. Bakiri, “Solving multiclass learning problems via error-correcting output codes,” Journal of Artificial Intelligence Research, vol. 2, pp. 263––286, 1995. View at Google Scholar
  49. J. C. Platt, N. Cristianini, and J. Shawe-Taylor, “Large margin DAGs for multiclass classification,” Advances in Neural Information Processing Systems, vol. 12, pp. 547––553, 2000. View at Google Scholar
  50. E. J. Bredensteiner and K. P. Bennett, “Multicategory classification by support vector machines,” Computational Optimization and Applications, vol. 12, no. 1-3, pp. 53–79, 1999. View at Google Scholar
  51. K. Crammer and Y. Singer, “On the algorithmic implementation of multiclass kernel-based vector machines,” Journal of Machine Learning Research, vol. 2, pp. 265–292, 2001. View at Google Scholar
  52. Symantec, “Virus Encyclopedia of Symantec,” 2009, http://www.sarc.com/avcenter/venc.
  53. G. Salton and C. Buckley, “Term-weighting approaches in automatic text retrieval,” Information Processing and Management, vol. 24, no. 5, pp. 513–523, 1988. View at Google Scholar
  54. M. F. Porter, “Celebrating 40 years of ICT in libraries, museums and archives: An algorithm for suffix stripping,” Program, vol. 40, no. 3, pp. 211–218, 2006. View at Publisher · View at Google Scholar
  55. “Snowball: a String Processing Language for Creating Stemming algorithms in Information Retrieval,” 2008, http://snowball.tartarus.org.