2015
DOI: 10.2197/ipsjjip.23.579
|View full text |Cite
|
Sign up to set email alerts
|

Empowering Anti-malware Research in Japan by Sharing the MWS Datasets

Abstract: Substantial research has been conducted to develop proactive and reactive countermeasures against malware threats. Gathering and analyzing data are widely accepted approaches for accelerating the research towards understanding malware threats. However, collecting useful data is not an easy task for individuals or new researchers owing to several technical barriers, such as conducting honeypot operations securely. The anti-Malware engineering WorkShop (MWS) was organized in 2008 to fill this gap; since then, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 16 publications
0
19
0
Order By: Relevance
“…FFRI Dataset [3,4] is a dataset of dynamic analysis results obtained by executing malwares in Cuckoo Sandbox [33], which is a widely used open-source sandbox for malware analysis based on a virtual machine monitor. Four versions of FFRI Dataset are available (2013-2016); we choose the latest dataset, namely FFRI Dataset 2016.…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…FFRI Dataset [3,4] is a dataset of dynamic analysis results obtained by executing malwares in Cuckoo Sandbox [33], which is a widely used open-source sandbox for malware analysis based on a virtual machine monitor. Four versions of FFRI Dataset are available (2013-2016); we choose the latest dataset, namely FFRI Dataset 2016.…”
Section: Datasetmentioning
confidence: 99%
“…The objective of this study is to clarify the recent trends of anti-analysis operations executed by real-world malwares. In this paper, we report on the results of analyzing the dynamic behavior log of 8243 samples of Windows malwares recorded in a malware analysis dataset, namely FFRI Dataset 2016 [3,4]. This dataset includes a complete log of Windows API calls invoked by all the malware processes.…”
Section: Introductionmentioning
confidence: 99%
“…In the experiment, SVM (Support Vector Machine) and SCW (Soft-Confidence Weighted learning) [1] were compared. We used the data extracted from CCC DATAset2011 [2] for the attack data, and used the packets obtained on the campus network for the normal data, performed crossvalidation and calculated the accuracy. From the experimental results, SCW can be classified with the same accuracy, precision, and recall as SVM, and thus it is considered that sufficient accuracy can be obtained.…”
Section: Online Learning With Kernel Methodsmentioning
confidence: 99%
“…We also use BOS (Behavior Observable System), D3M (Drive-by Download Data by Marionette) dataset and NCD (Normal Communication Data in MWSCup 2014). These datasets are parts of the MWS datasets [33], and include pcap files. BOS and D3M contain malicious traffic.…”
Section: Experiments 51 Datasetmentioning
confidence: 99%