Android Botnet 2015 | Datasets | Research | Canadian Institute for Cybersecurity | UNB

Global Site Navigation (use tab and down arrow)

Canadian Institute for Cybersecurity

Android botnet dataset

We apologize, this dataset is not available at this time.

To give a comprehensive evaluation of Android botnets, we gathered a large collection of Android botnet samples representing 14 botnet families. Our accumulated dataset combines some botnet samples from the Android Genome Malware project, malware security blog, VirusTotal and samples provided by well-known anti-malware vendor. Overall, our dataset includes 1,929 samples spawning a period of 2010 (the first appearance of Android botnet) to 2014.

The Android Botnet dataset consists of 14 families:

Family, Year of discovery, No. of samples

  1. AnserverBot, 2011, 244
  2. Bmaster, 2012, 6
  3. DroidDream, 2011, 363
  4. Geinimi, 2010, 264
  5. MisoSMS, 2013, 100
  6. NickySpy, 2011, 199
  7. Not Compatible, 2014, 76
  8. PJapps, 2011, 244
  9. Pletor, 2014, 85
  10. RootSmart, 2012, 28
  11. Sandroid, 2014, 44
  12. TigerBot, 2012, 96
  13. Wroba, 2014, 100
  14. Zitmo, 2010, 80

The full research paper outlining the details of the dataset and its underlying principles:

  • Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A. Ghorbani, "Android Botnet: What URLs are telling us", 9th International Conference on Network and System Security (NSS), November 3-5, 2015, New York City, USA.