Skip to main content

A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network

  • Conference paper
  • First Online:
Advances in Networked-based Information Systems (NBiS 2023)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 183))

Included in the following conference series:

Abstract

As technology advances, the mechanical components of vehicles are being replaced by microcontrollers known as Electronic Control Units (ECUs). These ECUs connect to form an In-Vehicle Network, and they communicate control messages to each other in order to control the vehicle. There are several message protocols that can be used for IVN communication, but the most used protocol is the Controller Area Network (CAN) message. While CAN messages offer flexibility and cost-effectiveness to the network, their lack of security can make the network vulnerable to attacks, which can have serious consequences for both vehicles and drivers. In order to prevent such vulnerabilities, researchers have studied security systems such as Intrusion Detection Systems (IDS). However, the lack of availability and integrity of datasets can lead to misdetection, making it difficult to evaluate methods effectively. Therefore, we collected IVN messages based on several scenarios via collection tool. In this paper, we analyze CAN messages of each scenario and put into ML and DL models as testing dataset, and observe the results of each scenario. These findings shows miscalculation of the data collection scenario could lead to misdetection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Koscher, K., et al.: Experimental security analysis of a modern automobile. In: Proc. IEEE Symp. Secur. Privacy, May, pp. 447–462 (2010)

    Google Scholar 

  2. Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proc. USENIX Secur. Symp., San Francisco, CA, USA, vol. 4, p. 2021 (2011)

    Google Scholar 

  3. Valasek, C., Miller, C.: Adventures in automotive networks and control units. Def. Con. 21(260–264), 15–31 (2013)

    Google Scholar 

  4. Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2014)

    Google Scholar 

  5. Miller, C., Valasek, C.: ‘Remote exploitation of an unaltered passenger vehicle. In: Black Hat USA, vol. 2015, no. S91, Aug (2015)

    Google Scholar 

  6. Nie, S., Liu, L., Du, Y.: Free-fall: Hacking Tesla from wireless to CAN bus. In: Briefing, Black Hat USA, vol. 25, pp. 1–16, Jul (2017)

    Google Scholar 

  7. Nie, S., Liu, L., Du, Y., Zhang, W.: Over-the-air: how we remotely compromised the gateway, BCM, and autopilot ECUs of Tesla cars. In Proc. Black Hat USA, vol. 1. Las Vegas, NV, USA, Aug, pp. 1–19 (2018)

    Google Scholar 

  8. Wu, W., et al.: A survey of intrusion detection for in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 21(3) (2020)

    Google Scholar 

  9. Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In Proc. 25th USENIX Conf. Secur. Symp., Austin, TX, USA, Aug, pp. 911–927 (2016)

    Google Scholar 

  10. Barolli, L. (ed.): BWCCA 2021. LNNS, vol. 346. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-90072-4

    Book  Google Scholar 

  11. Wu, W., et al.: Sliding window optimized information entropy analysis method for intrusion detection on in-vehicle networks. IEEE Access 6, 45233–45245 (2018)

    Article  Google Scholar 

  12. Hoang, T.-N., Islam, M.R., Yim, K., Kim, D.: CANPerFL: improve in-vehicle intrusion detection performance by sharing knowledge. Appl. Sci. 13(11), 6369 (2023). https://doi.org/10.3390/app13116369

  13. Islam, M.R., Oh, I., Yim, K.: Universal intrusion detection system on in-vehicle network. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol. 177. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-35836-4_9

  14. Koh, Yeji & Kim, Seoyeon & Kim, Yoonji & Oh, Insu & Yim, Kangbin. (2022). Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network. https://doi.org/10.1007/978-3-031-08819-3_10

  15. PCAN-API documentation: documentation.help/PCAN-Basic/PCAN-API.html

    Google Scholar 

  16. Khastgir, S., Brewerton, S., Thomas, J., Jennings, P.: Systems approach to creating test scenarios for automated driving systems. Reliab. Eng. Syst. Saf. 215, 107610 (2021). ISSN 0951-8320, https://doi.org/10.1016/j.ress.2021.107610

  17. Confusion Matrix: https://en.wikipedia.org/wiki/Confusion_matrix

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2021R1A4A2001810) and Institute for Information & communications Technology Planning&Evaluation(IITP) grant funded by the Korea government(MSIT) (No. 2022-0-01197, Convergence security core talent training business (SoonChunHyangUniversity)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Batzorig, M., Koh, Y., Oh, I., Yim, K. (2023). A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network. In: Barolli, L. (eds) Advances in Networked-based Information Systems. NBiS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 183. Springer, Cham. https://doi.org/10.1007/978-3-031-40978-3_15

Download citation

Publish with us

Policies and ethics