Datasets:

Modalities:
Text
Formats:
text
ArXiv:
Libraries:
Datasets
License:
Dmitrijs Trizna commited on
Commit
e0d5605
·
1 Parent(s): 07df1e9
Files changed (1) hide show
  1. README.md +101 -0
README.md CHANGED
@@ -1,3 +1,104 @@
1
  ---
2
  license: apache-2.0
3
  ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
  ---
2
  license: apache-2.0
3
  ---
4
+
5
+ # About Dataset
6
+
7
+ ## Citation
8
+
9
+ This dataset was created and further refined as part of the following two publications:
10
+
11
+ - "Quo Vadis: Hybrid Machine Learning Meta-Model Based on Contextual and Behavioral Malware Representations", Trizna et al., 2022, https://dl.acm.org/doi/10.1145/3560830.3563726
12
+
13
+ - "Nebula: Self-Attention for Dynamic Malware Analysis", Trizna et al., 2024, https://ieeexplore.ieee.org/document/10551436
14
+
15
+ If you used it in your research, please cite us:
16
+
17
+ ```bibtex
18
+ @inproceedings{quovadis,
19
+ author = {Trizna, Dmitrijs},
20
+ title = {Quo Vadis: Hybrid Machine Learning Meta-Model Based on Contextual and Behavioral Malware Representations},
21
+ year = {2022},
22
+ isbn = {9781450398800},
23
+ publisher = {Association for Computing Machinery},
24
+ address = {New York, NY, USA},
25
+ url = {https://doi.org/10.1145/3560830.3563726},
26
+ doi = {10.1145/3560830.3563726},
27
+ booktitle = {Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security},
28
+ pages = {127–136},
29
+ numpages = {10},
30
+ keywords = {reverse engineering, neural networks, malware, emulation, convolutions},
31
+ location = {Los Angeles, CA, USA},
32
+ series = {AISec'22}
33
+ }
34
+ @ARTICLE{nebula,
35
+ author={Trizna, Dmitrijs and Demetrio, Luca and Biggio, Battista and Roli, Fabio},
36
+ journal={IEEE Transactions on Information Forensics and Security},
37
+ title={Nebula: Self-Attention for Dynamic Malware Analysis},
38
+ year={2024},
39
+ volume={19},
40
+ number={},
41
+ pages={6155-6167},
42
+ keywords={Malware;Feature extraction;Data models;Analytical models;Long short term memory;Task analysis;Encoding;Malware;transformers;dynamic analysis;convolutional neural networks},
43
+ doi={10.1109/TIFS.2024.3409083}}
44
+ ```
45
+
46
+
47
+ ## Description
48
+
49
+ This dataset contains EMBER features obtained from **93533** 32-bit portable executables (PE), used in *Quo Vadis* and *Nebula* papers. Features extraction scheme described in the original paper EMBER paper by Anderson and Roth: https://arxiv.org/abs/1804.04637.
50
+
51
+ Complementary dataset with of emulated behavioral reports by Speakeasy is available at https://huggingface.co/datasets/dtrizna/quovadis-speakeasy.
52
+
53
+ To reflect concept drift in malware:
54
+
55
+ - 76126 files that form a training set were collected in Jan 2022.
56
+ - 17407 files that form a test set were collected in Apr 2022.
57
+
58
+ ## Labels
59
+ Files noted as `benign` are clean. All others represent malware distributed over 7 families. A specific number of files in each category is below. Notably,
60
+
61
+ Successfully processed files:
62
+ ```
63
+ $ for file in $(find . | grep hashes); do wc -l $file; done
64
+ 24416 ./train/benign/hashes.txt
65
+ 4378 ./train/keylogger/hashes.txt
66
+ 8243 ./train/dropper/hashes.txt
67
+ 6548 ./train/coinminer/hashes.txt
68
+ 1697 ./train/rat/hashes.txt
69
+ 8733 ./train/trojan/hashes.txt
70
+ 9627 ./train/ransomware/hashes.txt
71
+ 11061 ./train/backdoor/hashes.txt
72
+
73
+ 7940 ./test/benign/hashes.txt
74
+ 1041 ./test/keylogger/hashes.txt
75
+ 252 ./test/dropper/hashes.txt
76
+ 1684 ./test/coinminer/hashes.txt
77
+ 1258 ./test/rat/hashes.txt
78
+ 1085 ./test/trojan/hashes.txt
79
+ 2139 ./test/ransomware/hashes.txt
80
+ 1940 ./test/backdoor/hashes.txt
81
+
82
+ ```
83
+
84
+ Errors:
85
+ ```
86
+ $ for file in $(find . | grep errors); do wc -l $file; done
87
+ 18 ./train/benign/errors.log
88
+ 0 ./train/keylogger/errors.log
89
+ 0 ./train/dropper/errors.log
90
+ 343 ./train/coinminer/errors.log
91
+ 0 ./train/rat/errors.log
92
+ 0 ./train/trojan/errors.log
93
+ 0 ./train/ransomware/errors.log
94
+ 1 ./train/backdoor/errors.log
95
+
96
+ 4 ./test/benign/errors.log
97
+ 0 ./test/keylogger/errors.log
98
+ 0 ./test/dropper/errors.log
99
+ 0 ./test/coinminer/errors.log
100
+ 0 ./test/rat/errors.log
101
+ 0 ./test/trojan/errors.log
102
+ 0 ./test/ransomware/errors.log
103
+ 0 ./test/backdoor/errors.log
104
+ ```