A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset
- URL: http://arxiv.org/abs/2012.14600v3
- Date: Wed, 7 Feb 2024 14:04:43 GMT
- Title: A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset
- Authors: Miki E. Verma and Robert A. Bridges and Michael D. Iannacone and
Samuel C. Hollifield and Pablo Moriano and Steven C. Hespeler and Bill Kay
and Frank L. Combs
- Abstract summary: Controller Area Networks (CANs) lack basic security properties and are easily exploitable.
producing vehicular CAN data with a variety of intrusions is out of reach for most researchers.
We present the first comprehensive guide to the existing open CAN intrusion datasets.
- Score: 1.6494191187996927
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack
basic security properties and are easily exploitable. A rapidly growing field
of CAN security research has emerged that seeks to detect intrusions on CANs.
Producing vehicular CAN data with a variety of intrusions is out of reach for
most researchers as it requires expensive assets and expertise. To assist
researchers, we present the first comprehensive guide to the existing open CAN
intrusion datasets, including a quality analysis of each dataset and an
enumeration of each's benefits, drawbacks, and suggested use case. Current
public CAN IDS datasets are limited to real fabrication (simple message
injection) attacks and simulated attacks often in synthetic data, which lack
fidelity. In general, the physical effects of attacks on the vehicle are not
verified in the available datasets. Only one dataset provides signal-translated
data but not a corresponding raw binary version. Overall, the available data
pigeon-holes CAN IDS works into testing on limited, often inappropriate data
(usually with attacks that are too easily detectable to truly test the method),
and this lack data has stymied comparability and reproducibility of results. As
our primary contribution, we present the ROAD (Real ORNL Automotive
Dynamometer) CAN Intrusion Dataset, consisting of over 3.5 hours of one
vehicle's CAN data. ROAD contains ambient data recorded during a diverse set of
activities, and attacks of increasing stealth with multiple variants and
instances of real fuzzing, fabrication, and unique advanced attacks, as well as
simulated masquerade attacks. To facilitate benchmarking CAN IDS methods that
require signal-translated inputs, we also provide the signal time series format
for many of the CAN captures. Our contributions aim to facilitate appropriate
benchmarking and needed comparability in the CAN IDS field.
Related papers
- Effective and Efficient Adversarial Detection for Vision-Language Models via A Single Vector [97.92369017531038]
We build a new laRge-scale Adervsarial images dataset with Diverse hArmful Responses (RADAR)
We then develop a novel iN-time Embedding-based AdveRSarial Image DEtection (NEARSIDE) method, which exploits a single vector that distilled from the hidden states of Visual Language Models (VLMs) to achieve the detection of adversarial images against benign ones in the input.
arXiv Detail & Related papers (2024-10-30T10:33:10Z) - AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN) [4.081467217340597]
The Controller Area Network (CAN) bus is a central system for managing in-vehicle communication between the electronic control units (ECUs)
CAN protocol poses security challenges due to inherent vulnerabilities, lacking encryption and authentication, which, combined with an expanding attack surface, necessitates robust security measures.
This paper considers the latest ROAD dataset, containing stealthy and sophisticated injections.
arXiv Detail & Related papers (2024-08-30T12:26:23Z) - Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning [0.2812395851874055]
This paper introduces a novel framework for detecting masquerade attacks in the CAN bus using graph machine learning (ML)
We show that by representing CAN bus frames as message sequence graphs (MSGs) and enriching each node with contextual statistical attributes from time series, we can enhance detection capabilities.
Our method ensures a comprehensive and dynamic analysis of CAN frame interactions, improving robustness and efficiency.
arXiv Detail & Related papers (2024-08-10T04:17:58Z) - UniTraj: A Unified Framework for Scalable Vehicle Trajectory Prediction [93.77809355002591]
We introduce UniTraj, a comprehensive framework that unifies various datasets, models, and evaluation criteria.
We conduct extensive experiments and find that model performance significantly drops when transferred to other datasets.
We provide insights into dataset characteristics to explain these findings.
arXiv Detail & Related papers (2024-03-22T10:36:50Z) - Wild Face Anti-Spoofing Challenge 2023: Benchmark and Results [73.98594459933008]
Face anti-spoofing (FAS) is an essential mechanism for safeguarding the integrity of automated face recognition systems.
This limitation can be attributed to the scarcity and lack of diversity in publicly available FAS datasets.
We introduce the Wild Face Anti-Spoofing dataset, a large-scale, diverse FAS dataset collected in unconstrained settings.
arXiv Detail & Related papers (2023-04-12T10:29:42Z) - X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network [6.68111081144141]
X-CANIDS dissects the payloads in CAN messages into human-understandable signals using a CAN database.
X-CANIDS can detect zero-day attacks because it does not require any labeled dataset in the training phase.
arXiv Detail & Related papers (2023-03-22T03:11:02Z) - CANShield: Signal-based Intrusion Detection for Controller Area Networks [29.03951113836835]
We propose CANShield, a signal-based intrusion detection framework for the CAN bus.
CanShield consists of three modules: a data preprocessing module that handles the high-dimensional CAN data stream at the signal level; a data analyzer module consisting of multiple deep autoencoder networks, each analyzing the time-series data from a different temporal perspective; and an attack detection module that uses an ensemble method to make the final decision.
arXiv Detail & Related papers (2022-05-03T04:52:44Z) - Unsupervised Domain Adaptive Learning via Synthetic Data for Person
Re-identification [101.1886788396803]
Person re-identification (re-ID) has gained more and more attention due to its widespread applications in video surveillance.
Unfortunately, the mainstream deep learning methods still need a large quantity of labeled data to train models.
In this paper, we develop a data collector to automatically generate synthetic re-ID samples in a computer game, and construct a data labeler to simultaneously annotate them.
arXiv Detail & Related papers (2021-09-12T15:51:41Z) - DAE : Discriminatory Auto-Encoder for multivariate time-series anomaly
detection in air transportation [68.8204255655161]
We propose a novel anomaly detection model called Discriminatory Auto-Encoder (DAE)
It uses the baseline of a regular LSTM-based auto-encoder but with several decoders, each getting data of a specific flight phase.
Results show that the DAE achieves better results in both accuracy and speed of detection.
arXiv Detail & Related papers (2021-09-08T14:07:55Z) - Time-Based CAN Intrusion Detection Benchmark [0.0]
Vehicle control systems are vulnerable to message injection attacks.
Time-based intrusion detection systems (IDSs) have been proposed to detect these messages.
We benchmark four time-based IDSs against the newly published ROAD dataset.
We also develop an after-market plug-in detector using lightweight hardware.
arXiv Detail & Related papers (2021-01-14T18:33:19Z) - Stance Detection Benchmark: How Robust Is Your Stance Detection? [65.91772010586605]
Stance Detection (StD) aims to detect an author's stance towards a certain topic or claim.
We introduce a StD benchmark that learns from ten StD datasets of various domains in a multi-dataset learning setting.
Within this benchmark setup, we are able to present new state-of-the-art results on five of the datasets.
arXiv Detail & Related papers (2020-01-06T13:37:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.