Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 12 von 40

Details

Autor(en) / Beteiligte
Titel
Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic
Ist Teil von
  • Data in brief, 2019-04, Vol.23, p.103863-103863, Article 103863
Ort / Verlag
Netherlands: Elsevier Inc
Erscheinungsjahr
2019
Link zum Volltext
Quelle
Alma/SFX Local Collection
Beschreibungen/Notizen
  • The datasets in this article are produced to evaluate the ability of MIL-STD-1553 intrusion detection systems to detect attacks that emulate normal non-periodical messages, at differing attack occurrence rates. And different data representations. We present three streams of simulated MIL-STD-1553 traffic containing both normal and attack messages corresponding to packets that were injected into the bus by a malicious remote terminal. The implemented attacks emulate normal non-periodical communication so detecting them with a low false positive rate is non-trivial. Each stream is separated into a training set of normal messages and a test set of both normal and attack messages. The test sets differ by the occurrence rate of attack messages (0.01%, 0.10%, and 1.00%). Each stream is also preprocessed into a dataset of message sequences so that it can be used for sequential anomaly detection analysis. The sequential test sets differ by the occurrence rate of attack sequences (0.14%, 1.26%, and 11.01%). All dataset files can be found in Mendeley Data, doi:10.17632/jvgdrmjvs3.3.
Sprache
Englisch
Identifikatoren
ISSN: 2352-3409
eISSN: 2352-3409
DOI: 10.1016/j.dib.2019.103863
Titel-ID: cdi_doaj_primary_oai_doaj_org_article_10fb75d04f9f464aa5e51267f273b0e4
Format
Schlagworte
Computer Science

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX