Our research described in this paper identifies a three part premise relating to the spyware paradigm. Firstly the data suggests spyware is proliferating at an exponential rate. Secondly ongoing research confirms that spyware produces many security risks – including that of privacy/confidentiality breaches via illicit data collection and reporting. Thirdly, anti-spyware controls are improving but are still considered problematic for several reasons. Our research then concludes that control measures to counter this very significant challenge should merit compliance auditing – and this auditing may effectively target the vital message passing performed by all illicit data collection spyware. Our research then evolves into an experiment involving the design and implementation of a software audit tool to conduct the desired compliance auditing. The software audit tool is positioned at the protected network’s gateway. The software audit tool uses ‘phone-home’ IP addresses as spyware signatures to detect the presence of the offending software. The audit tool also has the capability to differentiate legitimate message passing software from that produced by spyware – and ‘learn’ both new spyware signatures and new legitimate message passing profiles. The testing stage of the software has proven successful – albeit using very limited levels of network message passing variety and frequency.
[1]
Edgar A. Whitley,et al.
An Exploration of the Emergence, Development, and Evolution of Regulatory Characteristics of Information Systems
,
2002,
ICIS.
[2]
Stefan Saroiu,et al.
Measurement and Analysis of Spyware in a University Environment
,
2004,
NSDI.
[3]
Roger Thompson,et al.
Why spyware poses multiple threats to security
,
2005,
CACM.
[4]
Xin Luo,et al.
A framework for spyware assessment
,
2005,
CACM.
[5]
Tom Stafford,et al.
Spyware: The Ghost in the Machine
,
2004,
Commun. Assoc. Inf. Syst..
[6]
Martin Bichler,et al.
Design science in information systems research
,
2006,
Wirtschaftsinf..
[7]
Neveen Farag Awad,et al.
The deceptive behaviors that offend us most about spyware
,
2005,
CACM.
[8]
E Hart.
Ghost in the machine.
,
1991,
The Health service journal.