Research Article

A Novel Malware Classification Method Based on Crucial Behavior

Table 1

Summary of malware detection and classification work.

ApproachFeaturesNote

Eskandari et al. [27]API call sequenceSimple, vulnerable to reorder or irrelevant API calls
Lee et al. [28]API call sequence
Hansen et al. [29]API call sequence; arguments; frequency
Amin [30, 31]OpcodeEnd-to-end learning
D’Angelo et al. [32]API call sequence-based image
Park et al. [34]Behavioral graphHigh dimensional features can bring more calculations
Elhadi et al. [11]API call graph
Nikolopoulos and Polenakis [35]System call dependency graph
Fredrikson et al. [37]Optimally discriminative specificationSimplified representation of behavior graphs
Alam et al. [40]Control flow graph-based feature
Ding et al. [41]API dependency graph