This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1294
Mal-API-2019 Dataset
External Dataset
External Data Source
GitHub
Unknown
Unknown
55 (lowest rank is 55)

Category & Restrictions

Other
cyber attack, malware, computer worms
Unrestricted
true

Description


A public malware dataset generated by Cuckoo Sandbox based on Windows OS API

The dataset contains malware samples from eight different families: 832 spyware samples, 1001 downloader samples, 1001 trojan samples, 1001 worms samples, 379 adware samples, 891 dropper samples, 1001 virus samples, and 1001 backdoor samples. The associated study seeks to obtain data which will help to address machine learning based malware research gaps. The specific objective of the study is to build a benchmark dataset for Windows operating system API calls of various malware.

Additional Details

11.3MB
false
Unknown
cybercrime, web security exploits, malware, application programming interface, operating system, dropper, espionage techniques, inferlink corporation, mal-api-2019 dataset, 1294, technical communication, machine learning, cyberwarfare, trojan horse, rogue software, external data source, spyware, computer architecture, malware research, exploit, trojan horses, adware