Serial Number: 97
Year: 2021
Kind of Traffic: Simulated + Real
Publicly Available: Yes
Count of Records:
Features Count: 20+
No. of citations: 67
Attack Type: Replay attack
Download Links: https://ocslab.hksecurity.net/Datasets/automotive-ethernet-intrusion-dataset
Abstract: This dataset includes harmless Audio Video Transport Protocol (AVTP) packet captures originating from our physical automotive Ethernet testbed. It also incorporates a demonstration of a replay attack conducted on the automotive Ethernet to construct an intrusion dataset. In this scenario, we simulate a hypothetical situation in which an attacker inserts arbitrary AVTP data units (AVTPDUs) into the In-Vehicle Network (IVN) to create a single video frame on a terminal application connected to the AVB listener. This is achieved by strategically injecting previously generated AVTPDUs within a specific timeframe. To illustrate this attack, we extract 36 continuous AVTPDUs from one of our AVB datasets (contained in single-MPEG-frame pcap), collectively forming a single video frame. Subsequently, the attacker carries out a replay attack by repeatedly transmitting these 36 stream AVTPDUs. For the results of this replay attack, you can refer to the *_injected.pcap files. Additionally, the dataset includes four benign (attack-free) packet captures: driving_01_originalpcap (approximately 10 minutes), driving_02_original.pcap (approximately 16 minutes), indoors_01_original.pcap (around 24 minutes), and indoors_02_original.pcap (approximately 21 minutes). Table 68 shows the work who used AUTOMOTIVE ETHERNET INTRUSION dataset