Dataset

Android Mischief Dataset

Android Mischief Dataset

In this blog, we introduce our new dataset called the Android Mischief Dataset for the benefit of the security research community. It contains the network traffic from mobile devices infected with Android Remote Access Trojans. This blog describes the structure and the content of our dataset, its creation methodology, and links to download it.

IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1

This post is a continuation of the IoT-23 In Depth series based on the IoT-23 Dataset, the first dataset of malicious and benign IoT network traffic, that consists of 23 scenarios [1]. In this blog post we provide an analysis of Scenario 9 [2], CTU-IoT-Malware-Capture-60-1. This malware sample is called Gafgyt. This variant is an IoT malware family capable of different types of DDoS attacks and exploits vulnerabilities in other devices, such as routers, to expand its botnet which has been seen attacking gaming servers [3].

IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1

A couple of weeks ago, we released the IoT-23 Dataset, the first dataset of malicious and benign IoT network traffic,  that consists of 23 scenarios. In this blog post we provide an analysis of Scenario 18, CTU-IoT-Malware-Capture-9-1. This malware sample is Hajime. We analysed the binary sample and the network traffic of this scenario.

Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic

We have released the IOT23, the first dataset with real malware and benign IoT network traffic. It contains more than 300 million of labeled flows of more than 500 hours of network traffic. In this blog we explain how the dataset was created, and all the details about it.