This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-0932
Android Botnet dataset
External Dataset
External Data Source
University of New Brunswick
01/01/2014
01/01/2014
55 (lowest rank is 55)

Category & Restrictions

Other
malware, botnet, mobile software
Unrestricted
Unknown

Description


This dataset is a comprehensive evaluation of Android botnets, it gathered a large collection of Android botnet samples representing 14 botnet families.

The accumulated dataset combines some botnet samples from the Android Genome Malware project, malware security blog, VirusTotal and samples provided by well-known anti-malware vendor. Overall, the dataset includes 1929 samples spawning a period of 2010 (the first appearance of Android botnet) to 2014.
The Android Botnet dataset consists of 14 families:
Family, Year of discovery, No. of samples

AnserverBot, 2011, 244
Bmaster, 2012, 6
DroidDream, 2011, 363
Geinimi, 2010, 264
MisoSMS, 2013, 100
NickySpy, 2011, 199
Not Compatible, 2014, 76
PJapps, 2011, 244
Pletor, 2014, 85
RootSmart, 2012, 28
Sandroid, 2014, 44
TigerBot, 2012, 96
Wroba, 2014, 100
Zitmo, 2010, 80
;    cic@unb.ca.

Additional Details

N/A
false
Unknown
cybercrime, website, malware, smartphone, spamming, bot, android, computer viruses, antivirus software, inferlink corporation, alphabet inc, android botnet dataset, blog, cyberwarfare, google software, external data source, history of the internet, 932, virustotal, botnet, exploit, google acquisitions