Abstract
As the rapid growth of vehicle functions and safety technologies, the types of ECU (Electronic Control Unit) mounted inside the vehicle has increased, and accordingly, for the safety and security of CAN (Controller Area Network), a protocol to ensure the secure communication between ECUs is required. Due to the increasing need for research and analysis related to CAN protocol, various and accurate vehicle CAN data sets are required than ever before. In this paper, we propose more efficient and accurate data collection method for better analyze of CAN message, and based collected data, we have analyzed and made results using the amount of data, time intervals, and various characteristics from each method. The collected in-vehicle network datasets through this research are expected to be utilized for diverse security threat analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tomlinson, A., Bryans, J., Shaikh, S.A., Kalutarage, H.K.: Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows. IEEE (2018)
Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. IEEE (2016)
Zhou, F., Li, S., Hou, X.: Development method of simulation and test system for vehicle body CAN bus based on CANoe. IEEE (2008)
Taylor, A., Japkowicz, N., Leblanc, S.: Sylvain Leblanc: frequency-based anomaly detection for the automotive CAN bus. In: WCICSS (2015)
Olufowobi, H., et al.: SAIDuCANT: specification-based automotive intrusion detection using controller area network (CAN) timing. IEEE Trans. Veh. Technol. 69(2), 1484–1494 (2019)
Qin, H., Yan, M., Ji, H.: Application of controller area network (CAN) bus anomaly detection based on time series prediction. Veh. Commun. 27, 100291 (2021)
Kavousi-Fard, A., et al.: An evolutionary deep learning-based anomaly detection model for securing vehicles. IEEE Trans. Intell. Transp. Syst. 22(7), 4478–4486 (2020)
Understanding CAN Comunication, 28 May 2021. FESCARO. https://www.fescaro.com/ko/archives/249
Acknowledgments
This work was supported by the National Research Foundation of Korean (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A4A2001810). This work was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No. 2019-0-01343, Regional strategic industry convergence security core talent training business).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Koh, Y., Kim, S., Kim, Y., Oh, I., Yim, K. (2022). Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2022. Lecture Notes in Networks and Systems, vol 496. Springer, Cham. https://doi.org/10.1007/978-3-031-08819-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-08819-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08818-6
Online ISBN: 978-3-031-08819-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)