Research Article

Using a Subtractive Center Behavioral Model to Detect Malware

Table 1

Common malware types and their primary characteristics.

Common malware typesPrimary characteristics

VirusMost common and well-known malware
Attaches itself to other programs to replicate

WormSpreads by using computer network
Allows unauthorized access
Often opens backdoor in the victim system

Trojan HorseAppears to be a normal program, but it is not
Can open backdoors
Can cause unauthorized access
Can send critical information to the third party

BackdoorBypasses traditional security mechanisms
Opens system to remote access
Usually installed by using Trojans and worms
Used by viruses and worms for complex attacks

RootkitProvides administrator-level access
Hides their files from the operating system
Can combine with other malware

RansomwareEncrypts the data on infected system
Victim needs to pay ransom to view the data

SpywareCollects victim’s sensitive information and sends them to third parties
Commonly used to access credit card information or to identify user habits

Obfuscated malwareCan be any type of malware
Uses obfuscation techniques to make detection process more difficult