Skip to main content
Academic Conference / Research Paper

Intelligent Cyber-Attack Detection for Autonomous Vehicles - Car-Hacking Dataset with Real and Simulated CAN Traffic

Abstract

"Deep learning-ready dataset combining real vehicle CAN bus traffic and simulated attack scenarios (DoS, fuzzing, spoofing) for training intrusion detection systems to protect autonomous and connected vehicles from cyber-attacks."

Description

Overview

The Intelligent Cyber-Attack Detection for Autonomous Vehicles research published in 2025 introduces a comprehensive dataset and deep learning framework for detecting cyber-attacks on vehicular Controller Area Network (CAN) bus systems, critical for autonomous vehicle safety.

Dataset Composition

  • Real vehicle CAN traffic: Captured from actual vehicles during normal driving operations, including acceleration, braking, turning, and various driving modes (urban, highway, parking).
  • Simulated attack scenarios: Synthetically injected attack messages designed to mimic realistic adversarial actions without risking actual vehicle safety.
  • Attack types included: Denial of Service (DoS) flooding high-priority CAN IDs, fuzzy attacks with random message injection, spoofing/impersonation of legitimate ECU messages, and replay attacks.
  • Labeled dataset with binary (attack/benign) and multi-class (attack type) annotations for supervised learning.

CAN Bus Message Features

  • CAN ID: 11-bit or 29-bit identifier indicating message priority and source ECU.
  • Data Length Code (DLC): Number of data bytes (0-8) in the message payload.
  • Data bytes (DATA[0]-DATA[7]): Raw payload containing sensor readings, control commands, or diagnostic information.
  • Timestamp: High-resolution time of message transmission for temporal pattern analysis.
  • Derived features: Message frequency, inter-arrival time, payload entropy, ID transition patterns, and statistical aggregates over sliding windows.

Deep Learning Framework

  • Architecture: Convolutional Neural Networks (CNN), Recurrent Neural Networks (LSTM, GRU), or hybrid CNN-LSTM models for capturing spatial and temporal patterns in CAN traffic.
  • Training strategy: Supervised learning on labeled attack/benign data with class balancing techniques to handle imbalanced datasets.
  • Evaluation metrics: Accuracy, precision, recall, F1-score, false positive rate (critical for automotive safety), and detection latency.
  • Real-time capability: Models optimized for deployment on in-vehicle embedded systems with limited computational resources.

Reported Results

  • High detection accuracy (typically > 95%) across multiple attack types with low false positive rates suitable for safety-critical applications.
  • Demonstrated generalization to unseen attack variants and different vehicle models.
  • Feasibility of real-time inference on automotive-grade hardware (e.g., embedded GPUs, FPGA accelerators).

Use Cases

  • Autonomous vehicle security: Protecting self-driving cars from cyber-attacks that could manipulate sensors, steering, braking, or acceleration.
  • Connected vehicle networks: Securing Vehicle-to-Everything (V2X) communication from malicious message injection.
  • Intrusion detection systems (IDS): Deploying in-vehicle IDS that monitor CAN traffic in real time and alert or isolate compromised ECUs.
  • Security testing: Validating the robustness of automotive cybersecurity defenses during vehicle development and certification.
  • Regulatory compliance: Supporting compliance with emerging automotive cybersecurity standards (e.g., ISO/SAE 21434, UNECE WP.29).

📊 View Data Structure

To explore column names, data types, and sample rows, visit the official dataset page on Academic Conference / Research Paper.

Preview on Academic Conference / Research Paper

Cite This Dataset

Khan, Fahad Mazaed, & others (2025). Intelligent Cyber-Attack Detection for Autonomous Vehicles - Car-Hacking Dataset with Real and Simulated CAN Traffic. International Conference Proceedings. [Dataset]. Academic Conference / Research Paper. https://www.icck.org/filebob/uploads/storage/TACS_gOxO7SrxsEXlWoYRM.pdf

Select your preferred citation style above. The citation will automatically update and you can copy it to your clipboard.

Original source: Academic Conference / Research Paper (2025). Visit official page for more details.

Indexed by IoTDataset.com on Feb 01, 2026

Ready to Start Your Research?

Download this dataset directly from the official repository and start building your next breakthrough project.

Download Dataset

Related Topics & Keywords

Share This Research