Research Article

Using a Subtractive Center Behavioral Model to Detect Malware

Table 6

Extracted features.

NoRisk IDsFeaturesRelated sources

1I12, A{CreateFileSF}“c:\windows\...\sfile1.exe”
2I12, A{WriteFileSF }“c:\windows\...\sfile1.exe”
3I12, I12, A, P{WriteFileSF, ReadFileSF}“c:\windows\...\sfile1.exe” “c:\windows\...\sfile1.exe”
4I12, I22, P, A{ReadFileSF, WriteFileTP}“c:\windows\...\sfile1.exe” “c:\programfiles\...\tfile2.exe”
5I22, P{SearchDirectoryTP}“c:\programfiles\...\”
6I22, I22, P, P{SearchDirectoryTP, ReadFileTP}“c:\programfiles\...\” “c:\programfiles\...\tfile1.txt”
7I21, I22, P, P{SearchDirectoryTP, ReadFileTP}“c:\programfiles\...\” “c:\programfiles\...\tfile2.exe”
8I22, I22, A, A{WriteFileTP, SetValueTP}“c:\programFiles\...\tfile2.exe” “hklm\Software\...\...\key1
9I31, P{ReadFileST}“c:\windows\...\stfile1.dll” “c:\windows\...\stfile2.dll”