CAN Dataset for intrusion detection (OTIDS) 


Controller Area Network (CAN) is a bus communication protocol which defines a standard for reliable and efficient transmission between in-vehicle nodes in real-time. Since CAN message is broadcast from a transmitter to the other nodes on a bus, it does not contain information about the source and destination address for validation. Therefore, an attacker can easily inject any message to lead system malfunctions. In this paper, we propose an intrusion detection method based on the analysis of the offset ratio and time interval between request and response messages in CAN. If a remote frame having a particular identifier is transmitted, a receiver node should respond to the remote frame immediately. Thus, each node has a fixed response offset ratio and the time interval in a normal state while these values vary in attack state. Using this property, we can measure the response performance of the existing nodes based on the offset ratio and time interval between request and response messages. As a result, our methodology can detect intrusions by monitoring the offset ratio and time interval, and it allows quick intrusion detection with high accuracy.

1. Dataset

We provide datasets which include DoS attack, fuzzy attack, impersonation attack, and attack free states. Datasets were constructed by logging CAN traffic via the OBD-II port from a real vehicle while message injection attacks were performing. 

We extracted the in-vehicle data from KIA SOUL.

    1.    DoS Attack : Injecting messages of ‘0x000’ CAN ID in a short cycle.

    2.    Fuzzy Attack : Injecting messages of spoofed random CAN ID and DATA values.

    3.    Impersonation Attack : Injecting messages of Impersonating node, arbitration ID = '0x164'.

    4.    Attack Free State: Normal CAN messages.

1.1 Data attributes

Timestamp, CAN ID, DLC, DATA[0], DATA[1], DATA[2], DATA[3], DATA[4], DATA[5], DATA[6], DATA[7]

    1.    Timestamp : recorded time (s)

    2.    CAN ID : identifier of CAN message in HEX (ex. 043f)

    3.    DLC : number of data bytes, from 0 to 8

    4.    DATA[0~7] : data value (byte)

1.2 Summary of our dataset


For academic purpose, we are happy to release our datasets. If you use our dataset for your experiment, please cite our paper.

Dataset Download Link: Download

    1.    DoS Attack 

    2.    Fuzzy Attack 

    3.    Impersonation Attack 

    4.    Attack Free State

2. Publication

3. Contact

4. About label in our dataset

            The label of each record is as follows:

        5. Acknowledgement

This dataset is used for the the Anomaly Detection in Automobile Track in '2017 Information Security R&D dataset challenge' in South Korea. 

You can find additional resources and tutorials (written in Korean) in the above URLs. 

6. see also

Please see the page [HCRL/Datasets] to find out more in-vehicle IDS datasets or other datasets that we have.