DATASETS OF RT SPOOFING ATTACKS ON MIL-STD-1553 COMMUNICATION TRAFFIC

Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic

Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic

Blog Article

The datasets in this article are produced to evaluate the ability of MIL-STD-1553 intrusion detection systems to detect attacks that emulate normal non-periodical messages, at differing attack occurrence rates.And different data representations.We present three streams of simulated MIL-STD-1553 traffic containing both normal and attack messages corresponding to packets that were injected into the bus by a malicious remote terminal.The implemented attacks emulate normal non-periodical communication so detecting them Swivel Glider Accent Chair with a low false positive rate is non-trivial.

Each stream is separated into a training set of normal messages and a test set of both normal and attack messages.The test sets differ by the occurrence rate of attack messages (0.01%, 0.10%, and 1.

00%).Each stream is also preprocessed into a dataset of message sequences so that it can be used for sequential anomaly detection analysis.The sequential test sets Bag Topper differ by the occurrence rate of attack sequences (0.14%, 1.

26%, and 11.01%).All dataset files can be found in Mendeley Data, doi:10.17632/jvgdrmjvs3.

3.

Report this page