B-CAN Intrusion Dataset

1. Dataset Release

This dataset is a B-CAN normal dataset and abnormal dataset containing attack messages. This dataset was extracted from the Genesis g80 during about 24 minutes, and the attack messages were subsequently injected.

2. Dataset

2-1. data attributes

            • Timestamp: record time

            • Arbitration ID: identifier of CAN message in HEX (ex. 043f)

            • DLC: number of data bytes, from 0 to 8

            • Data[0] ~ Data[7]: data value (byte)

            • Label: 1.0 or 0.0, 1.0 represents injected message while 0.0 represents normal message

2-2. Attack type

Two attacks are provided: DoS, and Fuzzing. A DoS attack is an attack that denials service what the CAN bus protocol with meaningless messages by sending the fixed AID and payload. A fuzzing attack is an attack that causes unexpected behavior by sending a message with random AID, DLC, and payload values.

            • DoS: Injecting message of '0x00000000' CAN ID every 0.25 millisecond during 4 seconds

            • Fuzzing: Injects a message with random AID, DLC, and Payload values every 0.1 milliseconds during 1 seconds

3. download

Dataset Download Link : //

4. Contact

Huy Kang Kim (cenda at korea.ac.kr)