MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware

Citation Author(s):
Ramon
Solo de Zaldivar
University of Zurich
Alberto
Huertas Celdrán
University of Zurich
Jan
von der Assen
University of Zurich
Pedro Miguel
Sánchez Sánchez
University of Murcia
Gérôme
Bovet
armasuisse
Gregorio
Martínez Pérez
University of Murcia
Burkhard
Stiller
University of Zurich
Submitted by:
Alberto Huertas...
Last updated:
Tue, 05/24/2022 - 10:41
DOI:
10.21227/nvmb-eg69
Data Format:
License:
0
0 ratings - Please login to submit your rating.

Abstract 

This dataset accurately models the internal behavior of an IoT spectrum sensor (belonging to the ElectroSense platform and consisting of a Raspberry Pi 3 with a software-defined radio kit) when it is functioning normally and under attack. To accomplish it, the system calls of the IoT sensor are monitored under normal behavior, gathered, cleaned, and stored in a centralized directory. Then, the device is infected with current malware affecting IoT devices, such as the Bashlite botnet, Thetick backdoor, Bdvl rootkit, and a Ransomware proof of concept. The monitoring process is repeated for each malware, and infections are sequential, meaning that the device is not infected with more than one malware at a time.

Instructions: 

The dataset contains several folders with the captures of each behavior

Comments

First version with metadata

Submitted by Alberto Huertas... on Mon, 05/16/2022 - 11:18