Research Article

Using a Subtractive Center Behavioral Model to Detect Malware

Table 3

Summary of related works on malware detection methods.

PaperFeature representationGoal/successYear

Wagener et al. [14]System calls, Hellinger distance, phylogenetic treeIdentify new and different forms of malware2008
Park et al. [15]Creating system call diagramsIdentify different forms of malware2013
Islam et al. [16]Printable strings, API method frequenciesIdentify malware with 97% accuracy2013
Naval et al. [17]Diagram of system calls and relationsDetect code insertion attacks2015
Das et al. [18]System call frequencies, n-gramIdentify new and different forms of malware2016
Zhang et al. [19]API calls sequence to construct a behavior chainIt achieved 98.64% accuracy with 2% FPR2019