Visible to the public SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research

TitleSherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research
Publication TypeConference Paper
Year of Publication2016
AuthorsMirsky, Yisroel, Shabtai, Asaf, Rokach, Lior, Shapira, Bracha, Elovici, Yuval
Conference NameProceedings of the 2016 ACM Workshop on Artificial Intelligence and Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4573-6
Keywordsanomaly detection, artificial intelligence security, composability, Continuous Authentication, Forensics, Human Behavior, machine learning, Malware, Metrics, pubcrawl, Resiliency, smartphone dataset
Abstract

In this paper we describe and share with the research community, a significant smartphone dataset obtained from an ongoing long-term data collection experiment. The dataset currently contains 10 billion data records from 30 users collected over a period of 1.6 years and an additional 20 users for 6 months (totaling 50 active users currently participating in the experiment). The experiment involves two smartphone agents: SherLock and Moriarty. SherLock collects a wide variety of software and sensor data at a high sample rate. Moriarty perpetrates various attacks on the user and logs its activities, thus providing labels for the SherLock dataset. The primary purpose of the dataset is to help security professionals and academic researchers in developing innovative methods of implicitly detecting malicious behavior in smartphones. Specifically, from data obtainable without superuser (root) privileges. To demonstrate possible uses of the dataset, we perform a basic malware analysis and evaluate a method of continuous user authentication.

URLhttp://doi.acm.org/10.1145/2996758.2996764
DOI10.1145/2996758.2996764
Citation Keymirsky_sherlock_2016