Dmitrijs Trizna
commited on
Commit
·
e0d5605
1
Parent(s):
07df1e9
README
Browse files
README.md
CHANGED
@@ -1,3 +1,104 @@
|
|
1 |
---
|
2 |
license: apache-2.0
|
3 |
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
---
|
2 |
license: apache-2.0
|
3 |
---
|
4 |
+
|
5 |
+
# About Dataset
|
6 |
+
|
7 |
+
## Citation
|
8 |
+
|
9 |
+
This dataset was created and further refined as part of the following two publications:
|
10 |
+
|
11 |
+
- "Quo Vadis: Hybrid Machine Learning Meta-Model Based on Contextual and Behavioral Malware Representations", Trizna et al., 2022, https://dl.acm.org/doi/10.1145/3560830.3563726
|
12 |
+
|
13 |
+
- "Nebula: Self-Attention for Dynamic Malware Analysis", Trizna et al., 2024, https://ieeexplore.ieee.org/document/10551436
|
14 |
+
|
15 |
+
If you used it in your research, please cite us:
|
16 |
+
|
17 |
+
```bibtex
|
18 |
+
@inproceedings{quovadis,
|
19 |
+
author = {Trizna, Dmitrijs},
|
20 |
+
title = {Quo Vadis: Hybrid Machine Learning Meta-Model Based on Contextual and Behavioral Malware Representations},
|
21 |
+
year = {2022},
|
22 |
+
isbn = {9781450398800},
|
23 |
+
publisher = {Association for Computing Machinery},
|
24 |
+
address = {New York, NY, USA},
|
25 |
+
url = {https://doi.org/10.1145/3560830.3563726},
|
26 |
+
doi = {10.1145/3560830.3563726},
|
27 |
+
booktitle = {Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security},
|
28 |
+
pages = {127–136},
|
29 |
+
numpages = {10},
|
30 |
+
keywords = {reverse engineering, neural networks, malware, emulation, convolutions},
|
31 |
+
location = {Los Angeles, CA, USA},
|
32 |
+
series = {AISec'22}
|
33 |
+
}
|
34 |
+
@ARTICLE{nebula,
|
35 |
+
author={Trizna, Dmitrijs and Demetrio, Luca and Biggio, Battista and Roli, Fabio},
|
36 |
+
journal={IEEE Transactions on Information Forensics and Security},
|
37 |
+
title={Nebula: Self-Attention for Dynamic Malware Analysis},
|
38 |
+
year={2024},
|
39 |
+
volume={19},
|
40 |
+
number={},
|
41 |
+
pages={6155-6167},
|
42 |
+
keywords={Malware;Feature extraction;Data models;Analytical models;Long short term memory;Task analysis;Encoding;Malware;transformers;dynamic analysis;convolutional neural networks},
|
43 |
+
doi={10.1109/TIFS.2024.3409083}}
|
44 |
+
```
|
45 |
+
|
46 |
+
|
47 |
+
## Description
|
48 |
+
|
49 |
+
This dataset contains EMBER features obtained from **93533** 32-bit portable executables (PE), used in *Quo Vadis* and *Nebula* papers. Features extraction scheme described in the original paper EMBER paper by Anderson and Roth: https://arxiv.org/abs/1804.04637.
|
50 |
+
|
51 |
+
Complementary dataset with of emulated behavioral reports by Speakeasy is available at https://huggingface.co/datasets/dtrizna/quovadis-speakeasy.
|
52 |
+
|
53 |
+
To reflect concept drift in malware:
|
54 |
+
|
55 |
+
- 76126 files that form a training set were collected in Jan 2022.
|
56 |
+
- 17407 files that form a test set were collected in Apr 2022.
|
57 |
+
|
58 |
+
## Labels
|
59 |
+
Files noted as `benign` are clean. All others represent malware distributed over 7 families. A specific number of files in each category is below. Notably,
|
60 |
+
|
61 |
+
Successfully processed files:
|
62 |
+
```
|
63 |
+
$ for file in $(find . | grep hashes); do wc -l $file; done
|
64 |
+
24416 ./train/benign/hashes.txt
|
65 |
+
4378 ./train/keylogger/hashes.txt
|
66 |
+
8243 ./train/dropper/hashes.txt
|
67 |
+
6548 ./train/coinminer/hashes.txt
|
68 |
+
1697 ./train/rat/hashes.txt
|
69 |
+
8733 ./train/trojan/hashes.txt
|
70 |
+
9627 ./train/ransomware/hashes.txt
|
71 |
+
11061 ./train/backdoor/hashes.txt
|
72 |
+
|
73 |
+
7940 ./test/benign/hashes.txt
|
74 |
+
1041 ./test/keylogger/hashes.txt
|
75 |
+
252 ./test/dropper/hashes.txt
|
76 |
+
1684 ./test/coinminer/hashes.txt
|
77 |
+
1258 ./test/rat/hashes.txt
|
78 |
+
1085 ./test/trojan/hashes.txt
|
79 |
+
2139 ./test/ransomware/hashes.txt
|
80 |
+
1940 ./test/backdoor/hashes.txt
|
81 |
+
|
82 |
+
```
|
83 |
+
|
84 |
+
Errors:
|
85 |
+
```
|
86 |
+
$ for file in $(find . | grep errors); do wc -l $file; done
|
87 |
+
18 ./train/benign/errors.log
|
88 |
+
0 ./train/keylogger/errors.log
|
89 |
+
0 ./train/dropper/errors.log
|
90 |
+
343 ./train/coinminer/errors.log
|
91 |
+
0 ./train/rat/errors.log
|
92 |
+
0 ./train/trojan/errors.log
|
93 |
+
0 ./train/ransomware/errors.log
|
94 |
+
1 ./train/backdoor/errors.log
|
95 |
+
|
96 |
+
4 ./test/benign/errors.log
|
97 |
+
0 ./test/keylogger/errors.log
|
98 |
+
0 ./test/dropper/errors.log
|
99 |
+
0 ./test/coinminer/errors.log
|
100 |
+
0 ./test/rat/errors.log
|
101 |
+
0 ./test/trojan/errors.log
|
102 |
+
0 ./test/ransomware/errors.log
|
103 |
+
0 ./test/backdoor/errors.log
|
104 |
+
```
|