Review Article
A Survey on Adversarial Attack in the Age of Artificial Intelligence
Table 8
Common datasets for malware adversarial attack.
| Type of dataset | Data source | Application instances |
| Publicly accessible dataset | VirusShare; Citadel; APT1 | Kolosnjaji et al. 2018 [46]; Al-Dujaili et al. 2018 [45] | VirusTotal | Song et al. 2020 [47]; Huang et al. 2019 [106]; Suciu et al. 2019 [107] | Drebin | Xu et al. 2020 [108]; Chen et al. 2020 [63]; Demontis et al. 2019 [20]; Arp et al. 2014 [109] | https://malwr.com/ | Hu et al. 2017 [44] | NSL-KDD | Zhang et al. 2020 [110] | MAMADROID | Chen et al. 2020 [63] | EMBER | Suciu et al. 2019 [107] | MasterDGA; Alexa site | Alaeiyan et al. 2019 [111] |
| Commercial dataset | The Kaggle Malware dataset of Microsoft | Salem et al. 2019 [112]; Yan et al. 2018 [113] | McAfee Labs | Huang et al. 2019 [106] | FireEye; Reversing Lab | Suciu et al. 2019 [107] | Microsoft’s antimalware team | Stokes et al. 2018 [114] |
| Artificially generated dataset | Generated by toolkits manually | Suciu et al. 2019 [107] |
|
|