4 datasets found
  1. i

    Malware Analysis Datasets: Top-1000 PE Imports

    • ieee-dataport.org
    Updated Nov 8, 2019
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Angelo Oliveira (2019). Malware Analysis Datasets: Top-1000 PE Imports [Dataset]. https://ieee-dataport.org/open-access/malware-analysis-datasets-top-1000-pe-imports
    Explore at:
    Dataset updated
    Nov 8, 2019
    Authors
    Angelo Oliveira
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Top-1000 imported functions extracted from the 'pe_imports' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

  2. i

    Malware Analysis Datasets: Raw PE as Image

    • ieee-dataport.org
    Updated Nov 7, 2019
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Angelo Oliveira (2019). Malware Analysis Datasets: Raw PE as Image [Dataset]. https://ieee-dataport.org/open-access/malware-analysis-datasets-raw-pe-image
    Explore at:
    Dataset updated
    Nov 7, 2019
    Authors
    Angelo Oliveira
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Raw PE byte stream rescaled to a 32 x 32 greyscale image using the Nearest Neighbor Interpolation algorithm and then flattened to a 1024 bytes vector. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

  3. P

    EMBER Dataset

    • paperswithcode.com
    Updated Feb 2, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Hyrum S. Anderson; Phil Roth (2021). EMBER Dataset [Dataset]. https://paperswithcode.com/dataset/ember
    Explore at:
    Dataset updated
    Feb 2, 2021
    Authors
    Hyrum S. Anderson; Phil Roth
    Description

    A labeled benchmark dataset for training machine learning models to statically detect malicious Windows portable executable files. The dataset includes features extracted from 1.1M binary files: 900K training samples (300K malicious, 300K benign, 300K unlabeled) and 200K test samples (100K malicious, 100K benign).

  4. Malware Analysis Datasets: PE Section Headers

    • kaggle.com
    zip
    Updated Aug 14, 2019
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Angelo Oliveira (2019). Malware Analysis Datasets: PE Section Headers [Dataset]. https://www.kaggle.com/ang3loliveira/malware-analysis-datasets-pe-section-headers
    Explore at:
    zip(1307424 bytes)Available download formats
    Dataset updated
    Aug 14, 2019
    Authors
    Angelo Oliveira
    License

    Attribution-NonCommercial 4.0 (CC BY-NC 4.0)https://creativecommons.org/licenses/by-nc/4.0/
    License information was derived automatically

    Description

    Introduction

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data (PE Section Headers of the .text, .code and CODE sections) extracted from the 'pe_sections' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    Features

    Column name: hash
    Description: MD5 hash of the example
    Content: 32 bytes string

    Column name: size_of_data
    Description: The size of the section on disk
    Content: Integer

    Column name: virtual_address
    Description: Memory address of the first byte of the section relative to the image base
    Content: Integer

    Column name: entropy
    Description: Calculated entropy of the section
    Content: Float

    Column name: virtual_size
    Description: The size of the section when loaded into memory
    Content: Integer

    Column name: malware
    Description: Class
    Content: 0 (Goodware) or 1 (Malware)

    Acknowledgements

    Thank you Cuckoo Sandbox for developing such an amazing dynamic analysis environment!
    Thank you VirusShare! Because sharing is caring!

    Citations

    Please refer to http://dx.doi.org/10.21227/2czh-es14

  5. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Angelo Oliveira (2019). Malware Analysis Datasets: Top-1000 PE Imports [Dataset]. https://ieee-dataport.org/open-access/malware-analysis-datasets-top-1000-pe-imports

Malware Analysis Datasets: Top-1000 PE Imports

Explore at:
7 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
Nov 8, 2019
Authors
Angelo Oliveira
License

Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically

Description

This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Top-1000 imported functions extracted from the 'pe_imports' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

Search
Clear search
Close search
Google apps
Main menu