hendriow commited on
Commit
bc4d2bf
·
verified ·
1 Parent(s): 6797fb9

Create README.md

Browse files
Files changed (1) hide show
  1. README.md +120 -0
README.md ADDED
@@ -0,0 +1,120 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ ---
3
+ task_categories:
4
+ - tabular-classification
5
+ - other
6
+ tags:
7
+ - security
8
+ - android
9
+ - malware
10
+ - cybersecurity
11
+ - int8
12
+ size_categories:
13
+ - 100K<n<1M
14
+ license: cc-by-4.0
15
+ language:
16
+ - en
17
+ pretty_name: MH-100K Android Malware Dataset
18
+ ---
19
+
20
+ # MH-100K: A Comprehensive Android Malware Dataset
21
+
22
+ ## Dataset Summary
23
+
24
+ **MH-100K** is a large-scale dataset for Android malware detection research. It contains **101,975** Android applications (APKs) collected between **2010 and 2022**, providing a diverse set of samples to study malware evolution over more than a decade.
25
+
26
+ The dataset features high-dimensional tabular data representing the static analysis of these applications. It includes permissions, API calls, and intents, along with extensive metadata and detection labels derived from VirusTotal.
27
+
28
+ ## Dataset Structure
29
+
30
+ The repository contains the dataset in a consolidated, efficient format:
31
+
32
+ - **`mh100.parquet`**: The main dataset file containing the feature matrix and metadata for all 101,975 instances. Stored in `int8` format for efficiency.
33
+ - **`mh100-labels.csv`**: Contains the label information (Malware vs Benign) and VirusTotal metadata.
34
+ - **`feature_names.csv`**: A mapping file that lists the names of the features corresponding to the columns in the feature matrix.
35
+
36
+ ## How to Use
37
+
38
+ You can load this dataset directly using the Hugging Face `datasets` library.
39
+
40
+ ### Quick Load
41
+
42
+ ```python
43
+ from datasets import load_dataset
44
+ import pandas as pd
45
+
46
+ # Load the main parquet file
47
+ dataset = load_dataset("hendriow/mh100k", data_files="mh100.parquet", split="train")
48
+
49
+ # Example: Inspect the first instance
50
+ print(dataset[0])
51
+ ```
52
+
53
+ ### Loading with Feature Names
54
+
55
+ Since the dataset is high-dimensional (>24k features), the columns in the parquet file might be indexed. You can map them back to their real names (e.g., `android.permission.INTERNET`) using the `feature_names.csv` file.
56
+
57
+ ```python
58
+ from datasets import load_dataset
59
+ import pandas as pd
60
+
61
+ # 1. Load the Data
62
+ dataset = load_dataset("hendriow/mh100k", data_files="mh100.parquet", split="train")
63
+
64
+ # 2. Load the Feature Names
65
+ # We use pandas to read the feature mapping file directly from the repo URL or locally
66
+ repo_url = "[https://huggingface.co/datasets/hendriow/mh100k/resolve/main/feature_names.csv](https://huggingface.co/datasets/hendriow/mh100k/resolve/main/feature_names.csv)"
67
+ feature_map = pd.read_csv(repo_url)
68
+ feature_names_list = feature_map['feature_name'].tolist()
69
+
70
+ # 3. (Optional) Convert to Pandas to see named columns
71
+ df = dataset.select(range(100)).to_pandas()
72
+ df.columns = feature_names_list + ['label'] # Assuming last col is label, adjust logic as needed
73
+ print(df.head())
74
+ ```
75
+
76
+
77
+ ## Dataset Description
78
+
79
+
80
+ The **MH-100K** dataset is a comprehensive collection of Android malware information, comprising 101,975 samples.
81
+ - **Data Type:** Tabular (Int8)
82
+ - **Time Period:** 2010 - 2022
83
+ - **Source:** Samples randomly selected from AndroZoo.
84
+
85
+ ### Features and Attributes
86
+
87
+ - SHA256 hash (APK's signature)
88
+ - File name
89
+ - Package name
90
+ - Android's official compilation API
91
+ - 166 permissions
92
+ - 24,417 API calls
93
+ - 250 intents
94
+
95
+
96
+ ### About VirusTotal API
97
+
98
+ The [VirusTotal API](https://developers.virustotal.com/reference/overview) is a crucial tool in this dataset's creation, known for its prowess in detecting suspicious files and URLs. Each API request yields a JSON, aiding in categorizing the APK based on its perceived threat.
99
+
100
+ ## Citation
101
+
102
+ If you use this dataset in your research, please cite the original authors:
103
+
104
+ > @article{bragancca2023android,
105
+ title={Android malware detection with MH-100K: An innovative dataset for advanced research},
106
+ author={Bragan{\c{c}}a, Hendrio and Rocha, Vanderson and Barcellos, Lucas and Souto, Eduardo and Kreutz, Diego and Feitosa, Eduardo},
107
+ journal={Data in Brief},
108
+ volume={51},
109
+ pages={109750},
110
+ year={2023},
111
+ publisher={Elsevier}
112
+ }
113
+ >
114
+ > @inproceedings{bragancca2023capturing, title={Capturing the behavior
115
+ > of android malware with mh-100k: A novel and multidimensional
116
+ > dataset}, author={Bragan{\c{c}}a, Hendrio and Rocha, Vanderson and
117
+ > Barcellos, Lucas Vilanova and Souto, Eduardo and Kreutz, Diego and
118
+ > Feitosa, Eduardo}, booktitle={Simp{\'o}sio Brasileiro de
119
+ > Seguran{\c{c}}a da Informa{\c{c}}{\~a}o e de Sistemas Computacionais
120
+ > (SBSeg)}, pages={510--515}, year={2023}, organization={SBC} }