B-CAN Intrusion Dataset
1. Dataset dESCRIPTION
B-CAN is a bus-type topology that performs low-speed communication compared to C-CAN and is mainly used for communication related to driving such as BCM lights, power windows, and smart key modules. The normal dataset was extracted from the Genesis g80 during about 24 minutes.
The attack dataset used the extracted normal dataset to inject DoS and Fuzzing attacks. The attack dataset is not extracted while directly injected into the vehicle, but packets are injected in the local computer.
2-1. data attributes
2-2. Attack type
Two attacks are provided: DoS, and Fuzzing. A DoS attack is an attack that denials service what the CAN bus protocol with meaningless messages by sending the fixed AID and payload. A fuzzing attack is an attack that causes unexpected behavior by sending a message with random AID, DLC, and payload values.
DoS: Injecting message of '0x00000000' CAN ID and ’00 00 00 00 00 00 00 00’ payload every 0.25 millisecond during 4 seconds. A total of 25 attacks were injected.
Fuzzing: Injects a message with random AID, DLC, and Payload values every 0.1 milliseconds during 1 seconds. A total of 10 attacks were injected. AID's random range is 0x000-0x7FF, DLC is 0-8, payload is '00 00 00 00 00 00 00 00’-'FF FF FF FF FF FF FF FF'.
2-3 Driving route
The normal dataset drive a round-trip one hour course around Korea University. We drive in the city, and one driver performed the dataset extraction. It is a one-hour course in total, and some were used to collect M-CAN and some B-CAN.