Research Article

Hybrid Botnet Detection Based on Host and Network Analysis

Table 8

Example of behavior vector of malicious process accumulation.

Time windowBehavior featureFeature scoreAccumulated feature score

win0EXE file creation11
win1AutoRun creation12
win2DLL file creation02