From: A state-of-the-art survey of malware detection approaches using data mining techniques
Advantage | Weakness |
---|---|
Detecting unconceived types of malware attacks | Storage complexity for behavioral patterns |
Data-flow dependency detector | Time complexity |
Detecting the polymorphic malwares |