B-CAN Intrusion Dataset

1. Dataset dESCRIPTION

 B-CAN is a bus-type topology that performs low-speed communication compared to C-CAN and is mainly used for communication related to driving such as BCM lights, power windows, and smart key modules. The normal dataset was extracted from the Genesis g80 during about 24 minutes. 

 The attack dataset used the extracted normal dataset to inject DoS and Fuzzing attacks. The attack dataset is not extracted while directly injected into the vehicle, but packets are injected in the local computer.


2. Dataset

2-1. data attributes 


2-2. Attack type

Two attacks are provided: DoS, and Fuzzing. A DoS attack is an attack that denials service what the CAN bus protocol with meaningless messages by sending the fixed AID and payload. A fuzzing attack is an attack that causes unexpected behavior by sending a message with random AID, DLC, and payload values.

2-3. Driving route

The attack-free samples were extracted from a one-hour round-trip driving course around Korea University in 2022. The samples for approximately 36 minutes of the drive were used to create the M-CAN intrusion dataset, while the samples for the remaining 24 minutes were utilized for the B-CAN intrusion dataset.

3. download

Download Link: Download


4. Contact

Huy Kang Kim (cenda at korea.ac.kr)


5. see also

Please see the page [HCRL/Datasets] to find out more in-vehicle IDS datasets or other datasets that we have.