Research Article

Toward Detecting Malware Based on Process-Aware Behaviors

Table 1

Comparison with related works.

ApproachFeatureModelDescription

[15]API call sequenceRF, SVM, and DNNsConsidering only the sequence of APIcalls in dynamic behavioral featureslimits malware detection performance
[5]

[6]API calls and argumentsGated-CNN and LSTMThe use of raw run-time argumentsintroduces time and space consumption

[3]API calls and argumentsText-CNN and Bi-LSTMAPI labelling reduces resource consumption, but lacks the perception of behavioral relationships between processes

[16]Process activities and treesML-based methodAnalysis of process relationships but lack of correlation analysis with specific actions performed within processes
[9]
[10]

[17]File, process, network, andML-based andMultiple complex full-behavior data increases the difficulty of analysis, and extra cting key behavioral information from the large amount of redundant data is difficult
[18]OS-level behaviorsCluster method