Car hacking: attack & defense challenge 2020

This is the dataset provided and collected while "Car Hacking: Attack & Defense Challenge" in 2020. We are the main organizer of the competition along with Culture Makers and Korea Internet & Security Agency. We are very proud of releasing these valuable datasets for all security researchers for free.

The competition aimed to develop attack and detection techniques of Controller Area Network (CAN), a widely used standard of in-vehicle network. The target vehicle of competition was Hyundai Avante CN7. 

Therefore, the dataset is a CAN network traffic of Avante CN7 including normal messages and attack messages. The dataset contains:
1) Preliminary round train/test dataset
2) Final round dataset of host's attack session

2. Class

Normal: Normal traffic in CAN bus.

Attack: Injected attack CAN messages. Four types of attacks are included: Flooding, Spoofing, Replay, Fuzzing.

3. Citation

Please cite our dataset's page and paper when you use this dataset as follows.

4. Dataset download

5. see also

Please see the page [HCRL/Datasets] to find out more in-vehicle IDS datasets or other datasets that we have.

6. contact

Hyunjae Kang (trifle19@korea.ac.kr) or Huy Kang Kim (cenda@korea.ac.kr)