cycloevan commited on
Commit
7e7af42
·
verified ·
1 Parent(s): 1528576

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +100 -3
README.md CHANGED
@@ -1,3 +1,100 @@
1
- ---
2
- license: cc-by-4.0
3
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ language:
3
+ - en
4
+ license: cc-by-4.0
5
+ task_categories:
6
+ - image-classification
7
+ - tabular-classification
8
+ tags:
9
+ - ransomware
10
+ - malware-detection
11
+ - cybersecurity
12
+ - pe-header
13
+ - binary-analysis
14
+ pretty_name: Ransomware PE Header Feature Dataset
15
+ size_categories:
16
+ - 1K<n<10K
17
+ ---
18
+
19
+ # Dataset Card for Ransomware PE Header Feature Dataset
20
+
21
+ ## Dataset Description
22
+
23
+ ### Dataset Summary
24
+
25
+ This dataset contains PE header features (first 1024 bytes) from 2,157 Windows executable samples, comprising 1,134 legitimate software (goodware) and 1,023 ransomware samples across 25 ransomware families. Each sample is represented by numerical features extracted from the raw PE header.
26
+
27
+ ### Supported Tasks
28
+
29
+ - **Binary Classification**: Distinguish between goodware and ransomware
30
+ - **Multi-class Classification**: Identify specific ransomware families
31
+ - **Malware Detection**: Train ML models for ransomware detection systems
32
+
33
+ ### Languages
34
+
35
+ The dataset contains binary executable files; documentation is in English.
36
+
37
+ ## Dataset Structure
38
+
39
+ ### Data Instances
40
+
41
+ Each row contains:
42
+ - `ID`: Sample identifier
43
+ - `filename`: Original filename or SHA-256 hash
44
+ - `GR`: Target class (0=goodware, 1=ransomware)
45
+ - `family`: Family ID (0 for goodware, 1-25 for ransomware families)
46
+ - `0-1023`: Numerical features (byte values 0-255) from PE header
47
+
48
+ ### Data Fields
49
+
50
+ - **ID**: Integer identifier (10000-11133 for goodware, 20000-21022 for ransomware)
51
+ - **filename**: String (executable name for goodware, SHA-256 hash for ransomware)
52
+ - **GR**: Binary integer (0 or 1)
53
+ - **family**: Integer (0-25)
54
+ - **0 through 1023**: Integer features (0-255 range)
55
+
56
+ ### Ransomware Families
57
+
58
+ The dataset includes 25 ransomware families: Avaddon, Babuk, Blackmatter, Conti, Darkside, Dharma, Doppelpaymer, Exorcist, Gandcrab, Lockbit, Makop, Maze, Mountlocker, Nefilim, Netwalker, Phobos, Pysa, Ragnarok, RansomeXX, Revil, Ryuk, Stop, Thanos, Wastedlocker, and Zeppelin.
59
+
60
+ ## Dataset Creation
61
+
62
+ ### Source Data
63
+
64
+ - **Ransomware**: Downloaded from VirusShare and Hybrid-Analysis databases
65
+ - **Goodware**: Collected from PortableApps, Softonic, Windows 10 system files, and verified no-install software
66
+ - **Verification**: All goodware scanned with ESET NOD32 Antivirus v15.1.12.0
67
+
68
+ ### Annotation Process
69
+
70
+ Ransomware samples were categorized using VirusTotal engine detections with three criteria:
71
+ - At least 45 engines flagged as malicious
72
+ - At least 15 engines flagged as ransomware
73
+ - At least 10 engines nominated the same family
74
+
75
+ ## Considerations for Using the Data
76
+
77
+ ### Discussion of Biases
78
+
79
+ - Dataset reflects ransomware families active during 2020-2021 period
80
+ - Sample selection based on availability in public malware repositories
81
+ - Goodware primarily consists of portable/no-install applications
82
+
83
+ ### Other Known Limitations
84
+
85
+ - PE header features only (first 1024 bytes); no full binary analysis
86
+ - File sizes range from 14.8 kB to 12.2 MB
87
+ - Windows executables only
88
+
89
+ ## Additional Information
90
+
91
+ ### Dataset Curators
92
+
93
+ Moreira, C.C., Moreira, D.C., Sales Jr., C. de S. de
94
+
95
+ ### Licensing Information
96
+
97
+ CC BY 4.0 - You are free to share and adapt the material with appropriate attribution.
98
+
99
+ ### Citation Information
100
+