Dataset Details: Automotive Ethernet Intrusion

Dataset Information

Serial Number: 97

Year: 2021

Kind of Traffic: Simulated + Real

Publicly Available: Yes

Count of Records:

Features Count: 20+

CITE

No. of citations: 67

Attack Type: Replay attack

Download Links: https://ocslab.hksecurity.net/Datasets/automotive-ethernet-intrusion-dataset

Abstract: This dataset includes harmless Audio Video Transport Protocol (AVTP) packet captures originating from our physical automotive Ethernet testbed. It also incorporates a demonstration of a replay attack conducted on the automotive Ethernet to construct an intrusion dataset. In this scenario, we simulate a hypothetical situation in which an attacker inserts arbitrary AVTP data units (AVTPDUs) into the In-Vehicle Network (IVN) to create a single video frame on a terminal application connected to the AVB listener. This is achieved by strategically injecting previously generated AVTPDUs within a specific timeframe. To illustrate this attack, we extract 36 continuous AVTPDUs from one of our AVB datasets (contained in single-MPEG-frame pcap), collectively forming a single video frame. Subsequently, the attacker carries out a replay attack by repeatedly transmitting these 36 stream AVTPDUs. For the results of this replay attack, you can refer to the *_injected.pcap files. Additionally, the dataset includes four benign (attack-free) packet captures: driving_01_originalpcap (approximately 10 minutes), driving_02_original.pcap (approximately 16 minutes), indoors_01_original.pcap (around 24 minutes), and indoors_02_original.pcap (approximately 21 minutes). Table 68 shows the work who used AUTOMOTIVE ETHERNET INTRUSION dataset

Back to Datasets