2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) 2021
DOI: 10.1109/3ict53449.2021.9581683
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Review of Security Threats Datasets for Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 32 publications
0
1
0
Order By: Relevance
“…Despite the growing demand for datasets in vehicular network research, only a few surveys comprehensively review and compare the existing datasets. In their review of datasets in the context of V2X security, the authors in [ 15 ] analyzed and classified the datasets based on their targeted architecture, the types of attacks included in each dataset, and their severity. While their approach is commendable, their review of the existing datasets could be more exhaustive.…”
Section: Existing Surveys On Vehicular Network Datasetsmentioning
confidence: 99%
“…Despite the growing demand for datasets in vehicular network research, only a few surveys comprehensively review and compare the existing datasets. In their review of datasets in the context of V2X security, the authors in [ 15 ] analyzed and classified the datasets based on their targeted architecture, the types of attacks included in each dataset, and their severity. While their approach is commendable, their review of the existing datasets could be more exhaustive.…”
Section: Existing Surveys On Vehicular Network Datasetsmentioning
confidence: 99%
“…ROAD also presents as a hub for researchers to reference the taxonomy of CAN data. Systematic and survey literature has recently been published citing the ROAD data [51,[80][81][82]. Some studies make claim that the ROAD dataset is the most comprehensive and realistic open CAN dataset available for evaluating and comparing CAN IDSs for attacks [51,81].…”
Section: Plos Onementioning
confidence: 99%
“…Systematic and survey literature has recently been published citing the ROAD data [51,[80][81][82]. Some studies make claim that the ROAD dataset is the most comprehensive and realistic open CAN dataset available for evaluating and comparing CAN IDSs for attacks [51,81]. Other research has referenced the quality of the dataset, used it to establish definitions within the CAN IDS research community, or cited the work as an establishment of research standards [21,[83][84][85][86][87][88][89][90].…”
Section: Plos Onementioning
confidence: 99%
“…A masquerade attack can be seen as a combination of a suspension attack and a spoofing attack. An attacker suspends message transmission from a specific ECU and transmits manipulated messages at the same frequency to the CAN bus to maintain the original CAN busload [31]. Lee et al [30] first published masquerade attack datasets performed on real vehicles by exploiting diagnostic services and a bus-off attack.…”
Section: Masquerade Attackmentioning
confidence: 99%
“…Despite these advancements, there is a need to evaluate the quality of these published datasets to ensure their effectiveness and suitability for IDS training and evaluation purposes. However, existing studies have predominantly focused on qualitative aspects, overlooking the quantitative measures of attack dataset quality [29,31,32]. We demonstrate the limitations of currently available published datasets for automotive ML-based IDS to illustrate the importance of high-quality datasets.…”
Section: Introductionmentioning
confidence: 97%