CrySyS dataset of CAN traffic logs containing fabrication and masquerade attacks

Despite their known security shortcomings, Controller Area Networks are widely used in modern vehicles. Research in the field has already proposed several solutions to increase the security of CAN networks, such as using anomaly detection methods to identify attacks. Modern anomaly detection procedu...

Teljes leírás

Elmentve itt :
Bibliográfiai részletek
Szerzők: Gazdag András Gábor
Ferenc Rudolf
Buttyán Levente
Dokumentumtípus: Cikk
Megjelent: 2023
Sorozat:SCIENTIFIC DATA 10 No. 1
Tárgyszavak:
doi:10.1038/s41597-023-02716-9

mtmt:34448268
Online Access:http://publicatio.bibl.u-szeged.hu/29945
Leíró adatok
Tartalmi kivonat:Despite their known security shortcomings, Controller Area Networks are widely used in modern vehicles. Research in the field has already proposed several solutions to increase the security of CAN networks, such as using anomaly detection methods to identify attacks. Modern anomaly detection procedures typically use machine learning solutions that require a large amount of data to be trained. This paper presents a novel CAN dataset specifically collected and generated to support the development of machine learning based anomaly detection systems. Our dataset contains 26 recordings of benign network traffic, amounting to more than 2.5 hours of traffic. We performed two types of attack on the benign data to create an attacked dataset representing most of the attacks previously proposed in the academic literature. As a novelty, we performed all attacks in two versions, modifying either one or two signals simultaneously. Along with the raw data, we also publish the source code used to generate the attacks to allow easy customization and extension of the dataset. © 2023, The Author(s).
Terjedelem/Fizikai jellemzők:11
ISSN:2052-4463