This is the extracted features from our dataset and the code for Dynamic Malware Analysis with Feature Engineering and Feature Learning.
IMPORTANT!
Due to the copyright, we cannot offer this code and dataset in public anymore.
If you need the code and dataset, please submit an application to this form.
We will reply the code and dataset to you as soon as possible.
Thare are three directories as following:
The data directory contains all the samples and the label.csv provides the labels of these samples.
The dataset.zip file is 331MB, expands to 11.2GB, and has a MD5 of 46cc2fe85037006a26a730ff0f8f9d54.
The original data at the dataset was collected from two months, April 2017 and May 2017. We run these malware at Cuckoo server and then collected their runtime logs. Then we applied the proposed feature engineering method on these logs to get this published dataset.
The summary of the dataset as the following:
Benign | Malicious | Total | |
---|---|---|---|
April | 10160 | 15609 | 25769 |
May | 20552 | 11465 | 32017 |
Total | 30712 | 27074 | 57786 |
Each sample is stored as numpy format, you can load it by numpy.load('./data/201704_0.npy')
. The shape of each sample is (LENGTH, 102), and the LENGTH is at most 1000. 102 is the dimension of each API call, please refer to our paper for more details.
This is the code of a feature engineering method.
Thare are two python scripts. The Features.py containes the core code of the feature engineering method. And the main.py implemented a multi-process function to call the Features.py.
Please refer to main function at each python script about how to run the code.
This is the deep learning model for our proposed approach, which is built within keras platform and the requriments.txt lists the necessary dependent packages.
If you want to run the model, please unzip the dataset/dataset.zip, then you can run the model.py by using python.