Dataset Details: Car Hacking

Dataset Information

Serial Number: 59

Year: 2020

Kind of Traffic: Real

Publicly Available: Yes

Count of Records: Yes

Features Count: 6

CITE

No. of citations: 555

Attack Type: DoS, Fuzzy,etc

Download Links: https://ocslab.hksecurity.net/Datasets/car-hacking-dataset

Abstract: Car-hacking datasets encompass a variety of intrusions, including fuzzy attacks, Denial-of-Service (DoS) attacks, drive gear mimicry, and RPM gauge emulation. These datasets were created by recording Controller Area Network (CAN) traffic from a real vehicle's OBD-II port during message injection attacks. Each dataset includes 300 intrusion instances, each lasting between 3 to 5 seconds, resulting in approximately 30 to 40 minutes of CAN traffic. The DoS attack involves injecting '0000' CAN ID messages every 0.3 milliseconds, resulting in 3,665,771 messages, with 3,078,250 normal and 587,521 injected messages. In the fuzzy attack, random CAN ID and DATA values are injected every 0.5 milliseconds, yielding 3,838,860 messages, with 3,347,013 normal and 491,847 injected messages. Spoofing attacks on drive gear and RPM information inject one message per millisecond, resulting in 4,443,142 and 4,621,702 messages, respectively, with normal message counts of 3,845,890 and 3,966,805, and injected message counts of 597,252 and 654,897. Lastly, in the GIDS Attack-free dataset, there are 988,987 messages, 988,872 of which are normal, and none are injected. Each dataset includes attributes like timestamp, CAN ID, DLC, DATA, and Flag to distinguish between normal ('R') and injected ('T') messages.

Back to Datasets