Skip to content
/ peeler Public

Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.

License

Notifications You must be signed in to change notification settings

ejaz629/peeler

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 

Repository files navigation

Peeler Overview: We collected active ransomware samples from more than 60 ransomware families. Each ransomware sample was executed in a VirtualBox and then manually labeled by each family type. We developled our own tool to collect provenance data which will be made available here. We ran each ransomware sample for ten minutes or until all user files were encrypted. It took more than 90 days to run all samples and collect data. For citation, please refer to our paper below:

@inproceedings{ahmed2021peeler,  title={Peeler: Profiling Kernel-Level Events to Detect Ransomware},  
author={Ahmed, Muhammad Ejaz and Kim, Hyoungshick and Camtepe, Seyit and Nepal, Surya},  
booktitle={European Symposium on Research in Computer Security},  
pages={240--260}, year={2021},  organization={Springer}}

About

Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published