five

hina-Code/CIC-MalMem-2022

收藏
Hugging Face2026-04-20 更新2026-04-26 收录
下载链接:
https://hf-mirror.com/datasets/hina-Code/CIC-MalMem-2022
下载链接
链接失效反馈
官方服务:
资源简介:
--- license: apache-2.0 --- CIC-MalMem-2022 was created by researchers at the Canadian Institute for Cybersecurity (CIC) at the University of New Brunswick. The details are described on the website https://www.unb.ca/cic/datasets/malmem-2022.html, and in their paper mentioned on that site: Tristan Carrier, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari,” Detecting Obfuscated Malware using Memory Feature Engineering”, The 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022. The dataset is based on 2,916 recent malware samples collected from VirusTotal, with 3 broad malware categories: Ransomware, Spyware and Trojans, with 5 sub-categories for each. For each sample 10 memory dumps were created, in order to try to capture more of the malware's behavior. The benign samples were created from "normal user behavior", using various applications on the same Windows 10 VM that was used to run the malware samples. The memory forensics tool VolMemLyzer (available at https://github.com/ahlashkari/VolMemLyzer) was then used to extract a total of 55 features, which were collected in a CSV file. I captured this file from Kaggle at https://www.kaggle.com/datasets/luccagodoy/obfuscated-malware-memory-2022-cic/data and re-produced a re-formatted version here.
提供机构:
hina-Code
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作