I understand the difference between the two as follows:
- In the first ' the signature-based' the code of the malware will be examined to extract some sort of signature that identifies malware with similar code .. the signature thus can be a binary sequence or a hash .. etc.
- In the behaviour-based malware detection the actual executable will be run to examine its behaviour instead of its code and then multiple techniques can be used such as statistical, machine learning .. etc.
The one thing that make unsure about these definitions is that I read in some papers as this one that 'dynamic analysis' can be used along with signature-based systems too ! is there any example for that .. will searching for a specific registry changes 'e.g. adding an executable to the autorun' will be considered as a signature-based detection system or behaviour-based detection system then ? an example is this in which category can it be classified ?