Research Article

Evaluating Grayware Characteristics and Risks

Table 7

Grayware classification based on payload and discovery date.

# Payload 2004 2005 2006 2007 2008

1Attack security software4 (0.005)60 (0.069)458 (0.527)33 (0.038)3358 (3.867)
2Hijack Session39 (0.045)183 (0.211)397 (0.457)14660 (16.883)86 (0.099)
3Popup advertisements58 (0.067)594 (0.684)43219 (49.772)611 (0.704)141 (0.162)
4Information theft49 (0.056)821 (0.946)621 (0.715)152 (0.175)3429 (3.949)
5Configuration Change83 (0.096)362 (0.417)1033 (1.190)602 (0.693)3578 (4.121)
6Arbitrary commands58 (0.067)404 (0.465)758 (0.873)14789 (17.031)151 (0.174)
7Download software37 (0.043)350 (0.403)3532 (4.068)1603 (1.846)794 (0.914)
8Terminate process10 (0.012)166 (0.191)597 (0.688)165 (0.190)105 (0.121)
9Network connection26 (0.030)313 (0.361)1307 (1.505)14829 (17.077)150 (0.173)
10File manipulation181 (0.208)12806 (14.748)1102 (1.269)241 (0.278)4009 (4.617)