Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions on CANs. Producing vehicular CAN data with a variety of intrusions is out of reach for most researchers as it requires expensive assets and expertise. To assist researchers, we present the first comprehensive guide to the existing open CAN intrusion datasets, including a quality analysis of each dataset and an enumeration of each's benefits, drawbacks, and suggested use case. Current public CAN IDS datasets are limited to real fabrication (simple message injection) attacks and simulated attacks often in synthetic data, which lack fidelity. In general, the physical effects of attacks on the vehicle are not verified in the available datasets. Only one dataset provides signal-translated data but not a corresponding raw binary version. Overall, the available data pigeon-holes CAN IDS works into testing on limited, often inappropriate data (usually with attacks that are too easily detectable to truly test the method), and this lack data has stymied comparability and reproducibility of results. As our primary contribution, we present the ROAD (Real ORNL Automotive Dynamometer) CAN Intrusion Dataset, consisting of over 3.5 hours of one vehicle's CAN data. ROAD contains ambient data recorded during a diverse set of activities, and attacks of increasing stealth with multiple variants and instances of real fuzzing, fabrication, and unique advanced attacks, as well as simulated masquerade attacks. To facilitate benchmarking CAN IDS methods that require signal-translated inputs, we also provide the signal time series format for many of the CAN captures. Our contributions aim to facilitate appropriate benchmarking and needed comparability in the CAN IDS field.
翻译:虽然在现代车辆中普遍存在,但主计长地区网络(CANS)缺乏基本的安保性质,而且很容易被利用。目前,CAN安全研究领域迅速扩大,试图探测CAN受到入侵的情况。制作有各种入侵的CAN数据,大多数研究人员都无法利用这些数据。因为需要昂贵的资产和专门知识,因此大多数研究人员无法利用这种数据。为了协助研究人员,我们为现有的开放的CAN入侵数据集提供了第一份全面的指南,包括对每个数据集进行质量分析,并列举每个数据集的利弊、缺陷和拟议使用案例。目前公开的CAN IDS数据集仅限于真实的制造(简单信息注入)、袭击和模拟袭击,这些袭击往往缺乏准确性。一般来说,攻击对车辆的物理影响无法在现有的数据集中加以核实。只有一个数据集提供信号翻译数据,但并非相应的原始二进制版本。总体而言,现有的数据储存库用于测试有限、通常不适当的数据(而攻击则太容易检测方法),并且这种数据缺乏真实的模拟(简单的信息输入) 攻击的真实性、真实性攻击的真实性、真实性攻击的数据数据在我们的内部数据中不断更新。