MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware

- Citation Author(s):
-
Ramon Solo de Zaldivar (University of Zurich)
- Submitted by:
- Alberto Huertas Celdran
- Last updated:
- DOI:
- 10.21227/nvmb-eg69
- Data Format:
- Categories:
- Keywords:
Abstract
This dataset accurately models the internal behavior of an IoT spectrum sensor (belonging to the ElectroSense platform and consisting of a Raspberry Pi 3 with a software-defined radio kit) when it is functioning normally and under attack. To accomplish it, the system calls of the IoT sensor are monitored under normal behavior, gathered, cleaned, and stored in a centralized directory. Then, the device is infected with current malware affecting IoT devices, such as the Bashlite botnet, Thetick backdoor, Bdvl rootkit, and a Ransomware proof of concept. The monitoring process is repeated for each malware, and infections are sequential, meaning that the device is not infected with more than one malware at a time.
Instructions:
The dataset contains several folders with the captures of each behavior