Skip to main content

Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 496))

Abstract

As the rapid growth of vehicle functions and safety technologies, the types of ECU (Electronic Control Unit) mounted inside the vehicle has increased, and accordingly, for the safety and security of CAN (Controller Area Network), a protocol to ensure the secure communication between ECUs is required. Due to the increasing need for research and analysis related to CAN protocol, various and accurate vehicle CAN data sets are required than ever before. In this paper, we propose more efficient and accurate data collection method for better analyze of CAN message, and based collected data, we have analyzed and made results using the amount of data, time intervals, and various characteristics from each method. The collected in-vehicle network datasets through this research are expected to be utilized for diverse security threat analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tomlinson, A., Bryans, J., Shaikh, S.A., Kalutarage, H.K.: Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows. IEEE (2018)

    Google Scholar 

  2. Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. IEEE (2016)

    Google Scholar 

  3. Zhou, F., Li, S., Hou, X.: Development method of simulation and test system for vehicle body CAN bus based on CANoe. IEEE (2008)

    Google Scholar 

  4. Taylor, A., Japkowicz, N., Leblanc, S.: Sylvain Leblanc: frequency-based anomaly detection for the automotive CAN bus. In: WCICSS (2015)

    Google Scholar 

  5. Olufowobi, H., et al.: SAIDuCANT: specification-based automotive intrusion detection using controller area network (CAN) timing. IEEE Trans. Veh. Technol. 69(2), 1484–1494 (2019)

    Google Scholar 

  6. Qin, H., Yan, M., Ji, H.: Application of controller area network (CAN) bus anomaly detection based on time series prediction. Veh. Commun. 27, 100291 (2021)

    Google Scholar 

  7. Kavousi-Fard, A., et al.: An evolutionary deep learning-based anomaly detection model for securing vehicles. IEEE Trans. Intell. Transp. Syst. 22(7), 4478–4486 (2020)

    Google Scholar 

  8. Understanding CAN Comunication, 28 May 2021. FESCARO. https://www.fescaro.com/ko/archives/249

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korean (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A4A2001810). This work was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No. 2019-0-01343, Regional strategic industry convergence security core talent training business).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Koh, Y., Kim, S., Kim, Y., Oh, I., Yim, K. (2022). Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2022. Lecture Notes in Networks and Systems, vol 496. Springer, Cham. https://doi.org/10.1007/978-3-031-08819-3_10

Download citation

Publish with us

Policies and ethics