Review Article

A Survey on Adversarial Attack in the Age of Artificial Intelligence

Table 8

Common datasets for malware adversarial attack.

Type of datasetData sourceApplication instances

Publicly accessible datasetVirusShare; Citadel; APT1Kolosnjaji et al. 2018 [46]; Al-Dujaili et al. 2018 [45]
VirusTotalSong et al. 2020 [47]; Huang et al. 2019 [106]; Suciu et al. 2019 [107]
DrebinXu et al. 2020 [108]; Chen et al. 2020 [63]; Demontis et al. 2019 [20]; Arp et al. 2014 [109]
https://malwr.com/Hu et al. 2017 [44]
NSL-KDDZhang et al. 2020 [110]
MAMADROIDChen et al. 2020 [63]
EMBERSuciu et al. 2019 [107]
MasterDGA; Alexa siteAlaeiyan et al. 2019 [111]

Commercial datasetThe Kaggle Malware dataset of MicrosoftSalem et al. 2019 [112]; Yan et al. 2018 [113]
McAfee LabsHuang et al. 2019 [106]
FireEye; Reversing LabSuciu et al. 2019 [107]
Microsoft’s antimalware teamStokes et al. 2018 [114]

Artificially generated datasetGenerated by toolkits manuallySuciu et al. 2019 [107]