five

Android Malware Dataset

收藏
DataCite Commons2020-07-30 更新2025-04-09 收录
下载链接:
https://www.impactcybertrust.org/dataset_view?idDataset=1256
下载链接
链接失效反馈
官方服务:
资源简介:
We installed 5,000 of the collected samples (426 malware and 5,065 benign) on real devices. Our malware samples in the CICAndMal2017 dataset are classified into four categories: Adware Ransomware Scareware SMS Malware Our samples come from 42 unique malware families. The family kinds of each category and the numbers of the captured samples are as follows: Adware Dowgin family, 10 captured samples Ewind family, 10 captured samples Feiwo family, 15 captured samples Gooligan family, 14 captured samples Kemoge family, 11 captured samples koodous family, 10 captured samples Mobidash family, 10 captured samples Selfmite family, 4 captured samples Shuanet family, 10 captured samples Youmi family, 10 captured samples Ransomware Charger family, 10 captured samples Jisut family, 10 captured samples Koler family, 10 captured samples LockerPin family, 10 captured samples Simplocker family, 10 captured samples Pletor family, 10 captured samples PornDroid family, 10 captured samples RansomBO family, 10 captured samples Svpeng family, 11 captured samples WannaLocker family, 10 captured samples Scareware AndroidDefender 17 captured samples AndroidSpy.277 family, 6 captured samples AV for Android family, 10 captured samples AVpass family, 10 captured samples FakeApp family, 10 captured samples FakeApp.AL family, 11 captured samples FakeAV family, 10 captured samples FakeJobOffer family, 9 captured samples FakeTaoBao family, 9 captured samples Penetho family, 10 captured samples VirusShield family, 10 captured samples SMS Malware BeanBot family, 9 captured samples Biige family, 11 captured samples FakeInst family, 10 captured samples FakeMart family, 10 captured samples FakeNotify family, 10 captured samples Jifake family, 10 captured samples Mazarbot family, 9 captured samples Nandrobox family, 11 captured samples Plankton family, 10 captured samples SMSsniffer family, 9 captured samples Zsone family, 10 captured samples In order to acquire a comprehensive view of our malware samples, we created a specific scenario for each malware category. We also defined three states of data capturing in order to overcome the stealthiness of an advanced malware: Installation: The first state of data capturing which occurs immediately after installing malware (1-3 min). Before restart: The second state of data capturing which occurs 15 min before rebooting phones. After restart: The last state of data capturing which occurs 15 min after rebooting phones. For feature Extraction and Selection, we captured network traffic features (.pcap files), and extracted more than 80 features by using CICFlowMeter-V3 during all three mentioned states (installation, before restart, and after restart). See our publicly available Android Sandbox.
提供机构:
IMPACT
创建时间:
2019-09-10
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作