Research Article
Using a Subtractive Center Behavioral Model to Detect Malware
Table 2
Comparison of traditional and new generation malware.
| Comparison parameter | Traditional | New generation |
| Implementation level | Simple coded | Hard coded | State of behaviors | Static | Dynamic | Proliferation | Each copy is similar | Each copy is different | Through spreading | Uses .exe extension | Uses also different extensions | Permanence in the system | Temporal | Persistent | Interaction with processes | A few processes | Multiple processes | Using concealment techniques | None | Yes | Attack type | General | Targeted | Defensive challenge | Easy | Difficult | Targeted devices | A few devices | Many different devices |
|
|