Data Infrastructure Building Blocks for ISI. A Project of the University of Arizona (NSF #ACI-1443019), Drexel University,
University of Virginia, University of Texas at Dallas, and University of Utah
The portal is limited to non-commercial educational and research activities. Posting of spam messages or other commercial advertisements is a violation of these terms and may result in termination of your use.
Certain portions of the portal may be limited to registered users and/or allow a user to participate in online services by entering personal information. You agree that any information provided to the portal in these areas will be complete and accurate, and that you will neither register under the name of nor attempt to enter the portal under the name of another person or entity. You are responsible for maintaining the confidentiality of your user ID and password, if any, and for restricting access to your computer, and you agree to accept responsibility for all activities that occur under your account or password. AZSecure-data does not authorize use of your User ID by third-parties.
DISCLAIMER: ALL INFORMATION, PRODUCTS OR SERVICES PROVIDED THROUGH AZSECURE-DATA ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. AZSecure-data can make no warranties regarding the currency, accuracy, usefulness, or completeness of the information provided, including its effectiveness or viability. Any use of the information and data provided here is at the risk of the user. We reserve the right without prior notice to change, supplement, or delete parts of the data or web site, or to cease publication temporarily or permanently.
Intelligence and Security Informatics Data Sets
Because zip files can be automatically opened by an OS, storing malware directly inside a zip file is not advisable. For safe handling of malware, malware should be stored inside another container such as a tar.gz file. TAR.GZ files require additional tools on OS excepting some Linux. Best practice is to store malware inside multiple containers such that you need to extract at least one extra layer before arriving at any possible malware.
Disclaimers that datasets contain malware should be prominent both on the site where the dataset is downloaded and in the documentation associated with the dataset.
We are looking into ways of requiring an additional step before download of malware containing datasets, such as a popup or intermediary page with additional warnings. We are also considering the use of a standard password required to extract datasets containing malware. The container with the password would be stored along with documentation and password files, such that it would be hard to separate the password from the container needing it. If approved, this will be implemented during the migration to DSpace.
Malware should be handled inside a disposable VM. Each dataset containing malware includes recommendations for handling the malware during research. The PhishMonger platform is a VM that provides a safe space within which to work with malware containing files. Once the PhishMonger platform is released, links to the platform will be incorporated into all AZSecure-data.org malware containing collections.