Datasets:

Modalities:
Document
ArXiv:
DOI:
License:
anousias's picture
Update README.md
9eb1914 verified
---
license: cc-by-4.0
size_categories:
- 1K<n<10K
task_categories:
- image-classification
- image-segmentation
configs:
- config_name: 1024-unrolled
data_files:
- split: train
path: 1024-unrolled/*train*.tar
- split: valid
path: 1024-unrolled/*valid*.tar
- split: test
path: 1024-unrolled/*test*.tar
- config_name: 2048-unrolled
data_files:
- split: train
path: 2048-unrolled/*train*.tar
- split: valid
path: 2048-unrolled/*valid*.tar
- split: test
path: 2048-unrolled/*test*.tar
- config_name: 4096-unrolled_n
data_files:
- split: train
path: 4096-unrolled_n/*train*.tar
- split: valid
path: 4096-unrolled_n/*valid*.tar
- split: test
path: 4096-unrolled_n/*test*.tar
---
# COSOCO: Compromised Software Containers Image Dataset
- **Paper:** [Malware Detection in Docker Containers: An Image is Worth a Thousand Logs](https://huggingface.co/papers/2504.03238)
- **Dataset Documentation:** [COSOCO Dataset Documentation](./docs/COSOCO-dataset-readme-v1_0.pdf)
## Dataset Description
COSOCO (Compromised Software Containers) is a synthetic dataset of 3364 images representing benign
and malware-compromised software containers. Each image in the dataset represents a dockerized
software container that has been converted to an image using common byte-to-pixel tools widely used
in malware analysis. Software container records are labelled (1) **benign** or (2) **compromised**:
A benign software container will have installed commonly used harmless packages and tools, whereas
a compromised software container, will have, among harmless benign tools and packages, its underlying
file system affected by some activated malware instance. Each compromised instance is accompanied by
a mask, i.e. a black and white image which marks the pixels that correspond to the files of the
underlying system that have been altered by a malware. COSOCO aims to support the identification of
compromised software containers via the task of image classification task and the identification of
compromised files and file system regions inside a container via the image segmentation task.
## Acknowledgements
This project has received funding from the European Union’s Horizon Europe research and innovation
programme under grant agreement **No 101093069 (P2CODE)**. Disclaimer: Funded by the European Union. Views
and opinions expressed are however those of the author(s) only and do not necessarily reflect those of
the European Union or European Commission. Neither the European Union nor the European Commission can
be held responsible for them.
## Citation
The users of this dataset are kindly asked to cite the following paper:
```bibtex
@misc{
nousias2025malwaredetectiondockercontainers,
title={Malware Detection in Docker Containers: An Image is Worth a Thousand Logs},
author={Akis Nousias and Efklidis Katsaros and Evangelos Syrmos and Panagiotis Radoglou-Grammatikis and Thomas Lagkas and Vasileios Argyriou and Ioannis Moscholios and Evangelos Markakis and Sotirios Goudos and Panagiotis Sarigiannidis},
year={2025},
eprint={2504.03238},
archivePrefix={arXiv},
primaryClass={cs.CR},
url={https://arxiv.org/abs/2504.03238},
}
```
## Contact
Contact [Panagiotis Radoglou-Grammatikis](mailto:[email protected]) for questions or comments.