Science topic
Malware - Science topic
Analyzing, Reversing and Identifying malware
Questions related to Malware
Is there a dataset that contains Windows PE files, both malware and benign, which has already been reverse-engineered?
I want a huge raw dataset that I can process myself to conduct the research. Kindly help with the dataset.
Are digital objects (dots) the next “humans?” Sometime in the future, biological species cannot live on Earth any longer. But mankind has begun creating dots. When AI-themes finally over-swamp living species, dots will view the Universe the same way we did (after all, our corpora of libraries shan’t be incinerated). The dots shall ponder about “life” the way mankind is pondering about life today. Will there be “dot terrorists?” We know of computer malware today. Uh? Shall the “dot terrorists” be hirsute, too? Uh?
I'm seeking co-authors for a research paper on enhancing malware detection using Generative Adversarial Networks (GANs). The paper aims to present innovative approaches to improving cybersecurity frameworks by leveraging GANs for synthetic data generation. We are targeting submission to a Scopus-indexed journal.
If you have expertise in cybersecurity, machine learning (especially GANs), or data science and are interested in contributing to this paper, please reach out to me.
Hello Researchers and all,
Are you interested in Digital Twin, Cyber Attack and Dynamic Bayesian Network. Do you want to know what can happen to a digital twin based Industrial organization if a Malware and DDoS attack occur? What could be its impact on dynamic situation? If your answer is yes, Here I am sharing with you one of my paper link named, " Analyzing the impact of Cyber Attack on the performance of Digital Twin Based Industrial Organizations" which is got published in Journal of Industrial Information and Integration (Elsevier, Q1, IF = 15.7). You will get a good idea about:
- Digital Twin,
- Cyber attack propagation,
- Markov chain and
- Dynamic Bayesian Network
Not only this, We also discussed different prevention mechanism and resilience mechanism to keep your digital twin mostly functional under Malware and DDoS Attack. If you want to work further on this topic with different cyber attack and prevention mechanism, you will get an idea from this paper how to do this.
Here is the link of the paper:
From this link, you will get a 50 days' free access to the article. Anyone clicking on this link before August 03, 2024 will be taken directly to the final version of this fantastic article on ScienceDirect, which you are welcome to read or download. No sign up, registration or fees are required.
You are welcome to read, download and cite this article and flourish your research skill on cyber attack, Digital twin and Dynamic Bayesian Network.
I am currently engaged in research focused on advancing malware detection techniques and am excited about the potential for collaboration with like-minded professionals.
Pls how can I combine SVM-DT-RF and use it as a single android malware classifiers, how will the architecture and the algorithm look like?
Has any research been done on detecting malware embedded or attached with websites phishing? If available, kindly oblige me along with the dataset.
Dear everyone,
I am currently working on a project related to building a dataset of malware samples. I am looking for sources to download various malware samples (such as worms, trojans, etc.) and a large number of benign samples. I would greatly appreciate your support and guidance. Thank you very much
I am currently working on my master's thesis in the field of security, focusing on detecting malware in server environments.
I'm currently in search of datasets that contain historical cyberattacks and their features. More specifically, I am looking at these columns: Type of Malware, Attack Vector, Purpose, Attacker or Groups, Damages Done (in USD or number of people affected), Type of Sector, and Size of the Organization Affected. Any recommendations or sources where I can find such datasets?
Currently, I am thinking of topics like 'Developing a Machine Learning Model for Detecting Malware Attacks on Health Monitoring Applications'. Do you think it's feasible or are there any possible changes & narrow downs? Please share your ideas & any insights on how to proceed with this project.
We need large datasets to work on malware detection in android apks using deep learning
Android malware classification using machine learning algorithm aim and the objectives?
Is there some website that give us the possibility to download malware APK in order to study it? I’m interested to study the abuse of android.permission.RECORD_AUDIO in Android 8. In particular, given a malicious apk that uses RECORD_AUDIO, i want to prove with dynamic analysis it is recording.
Is there someone helps me to understand how to build the server of this apk https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/ ?Or at least,is there someone who can give me the server?I tried to disassemble the apk but it is obfuscated and I don’t know how can proceed
We are interested in malware static and dynamic analysis using Machine learning
Our data set is fairly small We are searching for Datasets for malware and benign ware for windows
Hey,
Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit".
My malware gave me full access and control over your computer, meaning, I got access to all your accounts (see password above) and I can see everything on your screen, turn on your camera or microphone and you won't even notice about it. I collected all your private data and I RECORDED YOU (through your webcam) SATISFYING YOURSELF! After that I removed my malware to not leave any traces. I can send the video to all your contacts, post it on social network, publish it on the whole web, including the darknet, where the sick people are, I can publish all I found on your computer everywhere! Only you can prevent me from doing this and only I can help you out in this situation. Transfer exactly 500$ with the current bitcoin (BTC) price to my bitcoin address. It's a very good offer, compared to all that horrible shit that will happen if I publish everything!
For my research purpose ->
Needed some journal papers that can ensure the whole process is used to detect malware as well as give a look at privacy on the cloud system.
Thank you sir/mam...
Also if possible discuss prevention mechanism
Please elaborate with different techniques with differences.
Course Description: "This course aims to provide an overview of Assembly Language Fundamentals of Penetration Testing. Assembly language is most used programming languages in reverse engineering. It helps to understand any malware. It is used to analyze the flaw of any malware. Specific topics to be covered in this knowledge unit must at least include computer systems, data representation, numbering systems, instruction execution, symbolic coding, data word definition, laterals, location counter, indexing, indirect addressing, relative addressing, and assembly systems, reverse engineering (it tells complete working process of any application.), malwares and analyze the flaw of any malware".
Please help as much as you can (material/syllabus/slides/textbook/others)
Thanks in advance
Greetings Colleagues
I would appreciate if you could help me collecting material/syllabus/slides/textbook/others for a new course entitled "Secure Assembly Coding "
Course Description: "This course aims to provide an overview of Assembly Language Fundamentals of Penetration Testing. Assembly language is most used programming languages in reverse engineering. It helps to understand any malware. It is used to analyze the flaw of any malware. Specific topics to be covered in this knowledge unit must at least include computer systems, data representation, numbering systems, instruction execution, symbolic coding, data word definition, laterals, location counter, indexing, indirect addressing, relative addressing, and assembly systems, reverse engineering (it tells complete working process of any application.), malwares and analyze the flaw of any malware".
Thanks in advance
Qasem
I want to propose an adaptive malware detection system by using machine learning, I just be sure about the main elements of such system that should be considered.
As we all know that KDD99 is considered as standard data set for malware detection based on network characteristics. I want to know; if such kind of standard data set exist for andriod malware?
If no, can any one please guide about some data set related to android malwares ; which are being used by researchers now a days.
Thanks,
I want malwares that are used in advanced persistent threat APT
samples for analysis
As more than 3.8 billion smart phones are used today. Malwares are increasing day by day. There are many datasets for Malware Detection. So I want to know which datasets should be used for detecting malwares on Android.
Hello,
Please suggest to me some ideas for a new model for Detecting & Classifying Malware by using neural networks, So that I can work with it. Should be more helpful if you can give me some description of the suggested model.
I need cybersecurity datasets for training machine learning algorithms, they could be for:
- intrusion detection
- DDoS detection
- Malware detection
- etc.
Hello, I am doing a research and I need info on AI based cyber-attack tools and malware that are being used on practice and are not only a theory. Links to papers and websites will be very useful. Thank you !
Hello all,
I am reproducing the Drebin malware detection system presented in a paper entitled "DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket". There are many re-implementations of this system in Github; however, the majority of them ignored the feature extraction step that indeed aims to extract the feature introduced in the paper from the APK samples (Android apps). As far as I know, one of the proper re-implementation is "https://github.com/Kenun99/Drebin"; but, the results of extracted features are not the same as what presented in Drebin public repository (https://www.sec.cs.tu-bs.de/~danarp/drebin/download.html).
Anyway, I would be grateful if anyone lets me know that how can I find an accurate re-implementation of this malware detection system?
I have chose the three algorithm for Malware detection and classification that is Decision tree, random forest and support vector machine. Will it work better for the following dataset?
Data set link : https://www.kaggle.com/c/malware-detection
i have downloaded dataset from virusshare.com but not able to read content of file. contagio has .apk samples which i dont want as it needs to reverse engineered.
i don't want to go for reverse engineering so want direct sample of data set of android malware.
Dear all
im new to malware classification
i need know the latest dataset abt the malware
pl help me in this regard
thnx
HI Everyone!
I am asking to know by you, expert in cybersecurity and mathematics, if Computer virology (the one of Cohen and Andler) is still an active field of research. That research made in France at Inria at 2000-2010 . I do not see any prosecutor and I do not understand if this is a dead branch or not. I am interested in it in order to understand malware and detect behavior.
Thank you very much for your precious help!
Bye
Please I am looking for a document listing technical artefacts used as evidence in digital forensics classified according to their evidential strength. Example IP address could be spoofed so it is a weak evidence, malware code similarity is a strong evidence etc.
Where can I find known malicious IP address Lists ?
They may be DDoS attack sources, or sources that induce malware, any kind of intrusions or any other malicious behavior.
Any pointers would be highly appreciated.
Thank you!!
I am interested in the field of malware detection. I have an IOT malware dataset contains binary files. I need some IOT benign binary samples for building my machine learning model. Could you please help me to find data.
Hi,
I need benchmark datasets for Android malware /benign API call sequences. The API call sequence is the ordered sequence of APIs that appears during dynamic analysis for android applications
VirusTotal website is a tool for detecting malware Android apps. But it also gives various information related to the APK uploaded, like manifest tags, permissions etc. I want to extract these information for multiple APKs. How to scrap it and extract this data for multiple APKs ?
I am a Phd Student, would like to explore malware detection system. It would be great if anyone can share Malgenome project dataset as site is not active anymore.
Hi there!!
I'm on research now about classification malware based on system call, Anyone know what malware system call looks like? and how to read it from Virustotal analysis?
I want to cluster APT malware into various families.
APTs from different groups like the way FireEye is classified.
Kindly Help me on this. Thanks in advance.
For Example I have 10000 Malware samples in the path E:\Malwares. which contains both Packed and Un-packed PE files. Now i want to split Packed and Unpacked PE Files separately. the result should be all packed file should be placed in E:\malwares\packed and all un-packed PE files should be place in E:\malwares\unpacked .
In particle swarm optimization , If I am getting good result with 30 number of features. then how to specify feature weight to these 30 feature? . I need to identify which is most significant for malware detection in descending order with their weight..
I have tons of malware signatures ( like this
e7ae40d25a6da15cdd3712f4f55153ac) belonging to different families, I have a few questions
1. How can i do feature extractions from the signatures
2. How can i develop a Neural Network capable of classifying new signatures into families based on the training dataset?
Detecting behaviour of a malware with polymorphism attribute.
Let's discuss a scenario where a thief sends an email with a fake link, hoping a user will click it. And the link could install malicious software, malware, in the user's computer. And the malware could transmit sensitive information back to the thief, you know, such as passwords. And this is fairly typical. Phishing schemes are becoming very common, because if you send them out to 10,000 people, you're probably gonna have 500 to 700 people who are dumb enough to click on them. How frequent and effective is Phishing schemes?
IoT with Machine Learning paper, authors used this Malware Genome data sets for there classification techniques. can i use different data sets which is not related a IoT malware data for my work related to IoT with machine learning
I am working on malware analysis. I know that publically available data set Malimg. I woulde like to know is there any data set publically available for research purpose.
In my opinion, interesting questions and research thesis may concern the following issues:
Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Some users use antivirus software, farewall, precautionary methods in using e-mail, etc., but this has not prevented, for example, attacks from cybercriminals using ransomware that encrypt and block access to disks on the computer.
In connection with the above, the techniques of data transfer security at the Interenet are constantly improved.
IT tools are being developed and improved, including antivirus software to protect a computer, laptop, tablet or smartphone against cybercrime and viruses sent, for example, in e-mails by hackers?
In view of the above, I am asking you the following question:
What are the new trends in research on cybercrime?
Please reply
Best wishes

Hello
I am working on suggesting some attacks that can be used to constructs new malware variants from existing ones to test the robustness of famous anti-malware systems. And I already construct a multiple malware sets and test the anti-malware system's robustness using virus total portal. I prepared a paper that contains my datasets testing results and sent it to a journal to be considered for publication. The paper is revised to make some modification and suggestion. I have some problems in understanding some requested modifications, for example, the reviewer is said:
* I suggest to evaluate the proposed approach using some real time bench-marked datasets.
The question her what the meaning of real-time bench-marked datasets in my case, if I have been applied my attacks on a well-known dataset and constructing multiple new malware datasets.
Also, the reviewers said:
Discuss, the complexity of your proposed solution.
So, what the meaning of complexity of solution if my contributions is attacks but not a solution for a specific problem?
Furthermore, the reviewers said:
* I would even suggest creating new labs and practical exercises based on this work.
What is the meant by this suggestion?
The threat to any system is ever present and there is no way to make any system impenetrable, a black box. Any malware or malicious code/program can be handled provided its very basic functionality is known i.e., if it is known what type and where the malware is. The system can scan itself and provide information about any irregular functioning or tasks it is undertaking with or without permission, but what if the malware is invisible, what if the system cannot detect what’s wrong with it. This leaves the system open for endless possibilities of vulnerabilities which can be used as an exploit.
Starting from the very basic it has been taught about what a virus or malware is, it’s types, how it functions and sometimes how can it be reverse-engineered but it’s never been taught or documented how to engineer a virus or how-to re-engineer it, moreover what to do when it is fundamentally absent.
With this project I are trying to achieve a system exploit/program which is fundamentally invisible to the system itself and provide solutions as to how to deal with such malware crisis.
Where can i get nearly 50000 to 100000 normal PEFILES(Not malware files) ?
Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Please reply
Best wishes

We are building a bibliography of InfoSec resources that address work groups, human threat assessment capabilities, and collaboration in InfoSec projects. Also applies to resisting disinformation and malware on social media sites.
CASIA v 2.0 database is actually available at http://forensics.idealtest.org/casiav2/
But, google says it is hacked and some malware is there in the site.
Please suggest me how I can download the dataset?
Anybody Please share the dataset offline.
Thanks in advance.
If software and hardware could prevent every security threat, there would be no intrusions, hacking, malware, or ransomware – yet there is news about new attacks almost daily. Why? Security is a process, not a product. The most effective cybersecurity operations require 24/7 monitoring with a Security Operations Center (SOC), separation of true security threats and information from the benign, and immediate response.
source: https://www.onshore.com/managed-security-services-panoptic-cyberdefense/cybersecurity-in-banking/
Determine Inherent Risk Profile Management can determine the institution’s overall Inherent Risk Profile based on the number of applicable statements in each risk level for all activities (Figure 2). For example, when a majority of activities, products, or services fall within the Moderate Risk Level, management may determine that the institution has a Moderate Inherent Risk Profile. Each category may, however, pose a different level of inherent risk. Therefore, in addition to evaluating the number of instances that an institution selects for a specific risk level, management may also consider evaluating whether the specific category poses additional risk.
How to extract features from Malware infected files by using different tools?
What is the exact procedure to extract malware features, store it in database and analyse it.
Please provide the necessary resources to learn the tools.
Salam all,
Execluding those which target traffic sniffing /middling, those spamed links for spoofed webpages for the sake of identity or credetials theft, or DDoS,
do you think that all malware that create harm for computers or mobile phones are in executable form? i.e. malware should be in executable form ?
What is the common characteristics in most of malware? (execluding their goals)
The employment of machine learning in security field is higly emarged in the current era. But, yet, did the researchers in security field utilize from it in 100% detection or protection from one or multiple kind of malwares ? Or do you forsee that malwares ( or specific malware type, like ransomware or trojan or ... ) will be obsolete due to the successful analysis of their behavior (Dynamic or static ?) by machine learning algorithims ?
Excited to read your views.
(Resources that support your opinions will be much supportive!)
People in the cybersecurity business keep saying that a password is dreadfully insecure, that someone can look over your shoulder and steal it, or they can listen to your communication with the bank, and steal it from that. There can be malware on your device, which reads what you type, and sends it a cybercriminal in another country. Even strong encryption is no use, since criminals now use GPU's to decrypt millions of credentials in just a few milliseconds.
But passwords are so convenient. Why would you want your iris scanned in the checkout queue at Target, or wait for an SMS message, telling you to enter yet another password? Most importantly, if you lose or forget your password, it can be reset, unlike any biometric parameter.
It would be most convenient, if you could enter your password in the usual way, but anyone watching would be unable to use what they saw, and anything listening to the (unencrypted) transmission would pick up useless garbage. Even better, if any malware on your device would also be unable to use anything it discovered.
This paper sheds light on this problem.
.
for the purpose of finding the spyware or malware detection and prediction.
I need to know the origin of the message or advertisement.
I have done m.tech from cyber security (malware detection). Now i want to do ph.D also but domain selection is a problem. want to switch from malware detection to big data. so this will be a right decision or continue with malware. Can any one suggest me
The number of malware continues to increase dynamically and are very complex and sophisticated. Distributed Malware contributes to loss or privacy invasion, having negative impact on confidentiality, integrity and availability of private data.
For a project, I am going to do static analysis on Android Malware Samples. I am looking for a large dataset .
i wanted to test the virus data set with different data mining algorithms..so kindly share the link of the repositories and best tools to experiment.
I have Android Malware dataset but don't know how to get dataset of benign or reliably good applications. I need both dataset for doing comparison in malware analysis.
I am want to know how signature based detection is implemented by anti-malware software companies. I know theoretical working of it but how it is implemented in actual software for efficient detection ?
latest benchmark data set for malware detection
I need a research topic in any of the two areas though not well knowledgeable on steganography but can read up if interesting.
Hi all
Are there any differences between legitimate requests which sent by a user versus requests that had sent because of malicious JavaScript?
which features are used to discriminate these requests and detect type of a ddos attack (browser based vs malware based)?
Thank You
I vishal gupta along with one of my friend aditya bhavsar working on apps classification ( benign or malicious ). So we need the dataset to proceed and we have searched a lot and found some site where they aks to mail them but no one is replying it's been 1-2 days.
Please reply at your earliest convenience.
Thanks
I have converted classes.dex using dex2jar tool and then using JD-UI tool in readable format.
This conversion returns me lots of class file located in multiple folder. I need to extract features from these class file for malware detection .
Is there any method with which i can move all classes file in same folder or should i have to handle all classes file by programming?(i.e. I have to open each folder one by one and each file one by one and then i have to extract methods name) . Any one have python script which can do this or some idea to extract methods name from all class file?
I have downloaded and unziped android malware dataset from virusshare.com , but i am unable to read its content . Type of file is not specified in virusshare.com.
Hi,
I have strings collected from malware and clean applications, these strings contain saved passwords, login names, directory information, ip addresses, error messages, ports etc. etc. Although some malware or clean applications contain junk as well but useful text as well as mentioned.
My question is how can I justify that these strings deserve spending time on text mining or not. In text mining I also mean sentiment analysis.
Regards
Spyware is one class in malware. What makes a research in spyware detection different from a research in malware detection?
i have read different feature ranking method
information gain, mutual information , chi squre test. i got few paper for PSO based feature ranking method .but not getting which will give me better result. can any one suggest me which feature ranking method will be better for detection of malware.
To minimise online business risks such as hacktivism, malware, DDoS, spear phishing, social engineering, and ransomware for online fraud targeting intellectual property, trademarks, reputational damage, and illegal money transfers. Some of the mitigation measures include patching software regularly; using strong passwords and installing antivirus software. However, the banking business cannot prevent every cyber breach.
Hi,
I am performing malware analysis and classification of internet of things malware, I have done static malware analysis.
For dynamic malware analysis, some people suggest that because its a slow and time taking process, so they suggested not to go for that.
But my question is does it really worth to analyse malware dynamically?
What kind of information I may get from dynamic analysis which I can miss in static analysis?
Any improvements which you think may benefit me a lot in terms of malware analysis in terms of IoT?
Regards
Malware ,Intrusion detection ,virus
i am using permission for detection of malware and now want to add sensitive function to create feature vector for more accuracy . can any one suggest me how i can get sensitive function for creation of feature vector . i am taking android manifest to extract permission then which file i should extract to get sensitive function?
I have read inertia weight PSO but not able to understant how it will help me for malware detection? i am not getting how it can apply to rank features ?
i am confuse that PSO is used to rank features or it is used with classification technique to improve its accuracy. i mean PSO can be used instead of IG(information gain) or it is used with SVM to enhace its classification accuracy.
For malware detection i want to use PSO with SVM but not able to find what changes should i made in PSO inertia weight which makes it more better for malware accuracy.
i want to detect malware in android based on network traffic analysis also.
can any one suggest me that which method i should use to detect malware samples which sent encrypted traffic to its remote server.
Hi everyone,
I want to do some research on WannaCry Ransomware Attack detection. Where can I find/ download WannaCry Ransomware Attack traffic data set ?
Thank you!
I would like to classify malware categories basing on APICall n-grams.
Attached is the work i had to tried to do including the sample of how dataset looks like.
I can only classify basing on API calls but not the APicall n-grams which is my interest.
Your help is highly appreciated
thank you
I have prepared list of features e.g. Internet Connection, File Upload etc that an android malware may have and then I have tested these features on both malware and benign samples. Now I want to add machine learning technique that could predict on the basis of extracted result that next application is either malware or benign. Which machine learning algorithm(s) will be best to apply here?
it possible to regain the original state from a corrupted state after a malware attack so that the system is resilient to attack? By the time attack is detected we may lose some of the data. We should prevent further attack and should retrieve the lost data
I am doing Academic Research in malware detection. I would like to get malicious windows executables that i can run to test their behavior.
Thank you
I am doing work on the feature extraction of malware.
Somewhere I found N-Grams techniques to extract features of malware but it's complicated to reach my goal.
find attachment for details:
Note: a just focus on Feature extraction of malware, not testing , training or classification.
i am looking for suggestion to what type of honeypot i can use?
probably suggestions?
any new area i can work on?
any related research paper?
please suggest.
I'm working to localize the malicious payload in malicious android code. To my best knowledge, a little work has been done addressing this problem. My main interests go in the direction of establishing only whether an app is trusted or malicious.
What kind of features do i need to consider in windows API calls that can help in detecting the behavior of malware using data mining techniques.
And how can that data be collected.
I need a concise and clear focused solution for it.
I am conducting a research on on-line social networks and I would like to test some methods that are supposed to detect phishing and malware links in OSN messages (tweets, facebook posts etc). Would you know some datasets that I could donwload (preferably XML, json, csv or any structured format) and that I could use to test my algorithms.
I am looking for research papers and related datasets. Any related literatures/resources are very much appreciated. Thank you.
Yesterday, my laptop got a deadly trojan virus having extension ccc that affects each of my files. Afterwards, all my files were encrypted to the bizarre format that couldn't be opened by any installed program. Even tried to look up for software to decrypt my affected files but didn't find any. It seems to be a serious issue, I would be really grateful if I could know any ways to resolve this problem. Thank you.
user can request for any website and phishing page then direclty move on orignal page