Skip to main content

Datasets

Standard Dataset

MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware

Citation Author(s):
Ramon Solo de Zaldivar (University of Zurich)
Alberto Huertas Celdrán (University of Zurich)
Jan von der Assen (University of Zurich)
Pedro Miguel Sánchez Sánchez (University of Murcia)
Gérôme Bovet (armasuisse)
Gregorio Martínez Pérez (University of Murcia)
Burkhard Stiller (University of Zurich)
Submitted by:
Alberto Huertas Celdran
Last updated:
DOI:
10.21227/nvmb-eg69
Data Format:
No Ratings Yet

Abstract

This dataset accurately models the internal behavior of an IoT spectrum sensor (belonging to the ElectroSense platform and consisting of a Raspberry Pi 3 with a software-defined radio kit) when it is functioning normally and under attack. To accomplish it, the system calls of the IoT sensor are monitored under normal behavior, gathered, cleaned, and stored in a centralized directory. Then, the device is infected with current malware affecting IoT devices, such as the Bashlite botnet, Thetick backdoor, Bdvl rootkit, and a Ransomware proof of concept. The monitoring process is repeated for each malware, and infections are sequential, meaning that the device is not infected with more than one malware at a time.

Instructions:

The dataset contains several folders with the captures of each behavior