Research Article

Using a Subtractive Center Behavioral Model to Detect Malware

Algorithm 1

Malware behavior creation algorithm.
(1)d1  ⟵  file1, d2  ⟵  file2, n ⟵  u(d1)
(2)for i  ⟵  1 to n
(3)if (d1[i][state] = = ‘AE’)
(4)    ⟵  A
(5)else
(6)    ⟵  P
(7)end if
(8)if (P.name = = d1.FileName)
(9)  μ  ⟵  self
(10)elif (eST = = ‘ss’)
(11)  μ  ⟵  system
(12)elif (eST = = ‘ts’)
(13)  μ  ⟵  thirdParty
(14)else
(15)  1 = 1
(16)end if
(17)if (d1[i−1][o] ! = d1[i][o])
(18)  if (d1[i][o] ! = rcK && d1[i][o] ! = cF && d1[i][o] ! = tE && d1[i][o] ! = pE)
(19)   if (d1[i−1][s] = = d1[i][s])
(20)    Write.d2()
(21)   end if
(22)  end if
(23)end if
(24)if (d1[i−1][o] = d1[i][o])
(25)  if (d1[i−1][sfP] ! = d1[i][sfP])
(26)   if (d1[i][o]! = rcK&& d1[i][o] ! = cF && d1[i][o] ! = tE && d1[i][o] ! = pE)
(27)    write.d2()
(28)   end if
(29)  end if
(30)end if
(31)end for