Research Article
Evaluating Grayware Characteristics and Risks
Table 7
Grayware classification based on payload and discovery date.
| # | Payload | 2004 | 2005 | 2006 | 2007 | 2008 |
| 1 | Attack security software | 4 (0.005) | 60 (0.069) | 458 (0.527) | 33 (0.038) | 3358 (3.867) | 2 | Hijack Session | 39 (0.045) | 183 (0.211) | 397 (0.457) | 14660 (16.883) | 86 (0.099) | 3 | Popup advertisements | 58 (0.067) | 594 (0.684) | 43219 (49.772) | 611 (0.704) | 141 (0.162) | 4 | Information theft | 49 (0.056) | 821 (0.946) | 621 (0.715) | 152 (0.175) | 3429 (3.949) | 5 | Configuration Change | 83 (0.096) | 362 (0.417) | 1033 (1.190) | 602 (0.693) | 3578 (4.121) | 6 | Arbitrary commands | 58 (0.067) | 404 (0.465) | 758 (0.873) | 14789 (17.031) | 151 (0.174) | 7 | Download software | 37 (0.043) | 350 (0.403) | 3532 (4.068) | 1603 (1.846) | 794 (0.914) | 8 | Terminate process | 10 (0.012) | 166 (0.191) | 597 (0.688) | 165 (0.190) | 105 (0.121) | 9 | Network connection | 26 (0.030) | 313 (0.361) | 1307 (1.505) | 14829 (17.077) | 150 (0.173) | 10 | File manipulation | 181 (0.208) | 12806 (14.748) | 1102 (1.269) | 241 (0.278) | 4009 (4.617) |
|
|