{"id":493,"date":"2022-11-27T21:31:04","date_gmt":"2022-11-27T21:31:04","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=493"},"modified":"2024-12-05T10:33:31","modified_gmt":"2024-12-05T10:33:31","slug":"isot-mil-std-1553-dataset","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/27\/isot-mil-std-1553-dataset\/","title":{"rendered":"ISOT Mil-STD-1553 Dataset"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||-620px|||&#8221; custom_padding=&#8221;7px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; animation_style=&#8221;zoom&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>&nbsp;<\/p>\n<h4 class=\"pdf\" title=\"ISOT Fake News Dataset Description\"><a class=\"pdf\" title=\"ISOT Fake News Dataset Description\" href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2023\/03\/ISOT-Mil-1553-IDS-Dataset-Description.pdf\" target=\"_blank\" rel=\"noopener\">Dataset Description<\/a><\/h4>\n<p><a title=\"ISOT HTTP Botnet Dataset Download\" href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2023\/03\/drive-download-20230309T000900Z-001.zip\" target=\"_blank\" rel=\"noopener\">Click here to download the ISOT Mil-STD-1553 Dataset <\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; width=&#8221;100%&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-size: medium\">ISOT Mil-STD-1553 Dataset<\/span><\/p>\n<p><span style=\"font-size: medium\">The dataset is a combination of datasets collected in a simulated environment consisting of normal activities and a series of attacks against the MIL-STD-1553 databus.<\/span><\/p>\n<p><span style=\"font-size: medium\">The simulation was conducted using Abaco R15-USB-2M USB interface box and Abaco BUSTOOLS\/1553 GUI Software for MIL-STD-1553 bus analysis, simulation, and data logging.<\/span><\/p>\n<p><span style=\"font-size: medium\">Figure 1 depicts the simulated bus components. The bus architecture used in the simulation consists of a bus monitor (BM) and five different avionic systems, including a flight control computer (FCC) as RT3, a mission computer (MC) as BC, an inertial reference unit (IRU) as RT1, a mission control keyboard (MCK) as RT4, and a multi-function display unit (MFD) as RT2. The MC serves as bus controller (BC), while the remaining components are remote terminals.<\/span><\/p>\n<p><span style=\"font-size: medium\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-495\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/11\/f-300x139.png\" alt=\"\" width=\"531\" height=\"246\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/11\/f-300x139.png 531w, https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/11\/f-480x223.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 531px, 100vw\" \/><\/span><\/p>\n<p><span style=\"font-size: medium\"><strong>Figure 1. <\/strong>Simulated MIL-STD-1553 bus components<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\">The components were the only ones used to execute the normal activities. To simulate the attack, we added a rogue terminal as RT0.<\/span><\/p>\n<p><span style=\"font-size: medium\">A baseline dataset consisting of normal activities was generated by running the simulation for 10 min. Subsequently, 6 different attack scenarios were run separately against the baseline architecture, by introducing RT0 as rogue terminal. Table 1 provides a summary of the different datasets and Table 2 shows the different fields involved in the raw data. The dataset is provided as separate CSV files.<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\"><strong>Table 1. <\/strong>Outline of the collected MIL-STD-1553 datasets<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<table style=\"width: 770px\">\n<tbody>\n<tr>\n<td style=\"width: 86.5px\"><span style=\"font-size: medium\"><strong>Dataset<\/strong> <strong>#<\/strong><\/span><\/td>\n<td style=\"width: 115.719px\"><span style=\"font-size: medium\"><strong>Type of data<\/strong><\/span><\/td>\n<td style=\"width: 131.109px\"><span style=\"font-size: medium\"><strong>Attack type<\/strong><\/span><\/td>\n<td style=\"width: 111.906px\"><span style=\"font-size: medium\"><strong>Attack description<\/strong><\/span><\/td>\n<td style=\"width: 129.531px\">\n<p><span style=\"font-size: medium\"><strong>Number of<\/strong><\/span><\/p>\n<p><span style=\"font-size: medium\"><strong>messages<\/strong><\/span><\/p>\n<\/td>\n<td style=\"width: 155.234px\"><span style=\"font-size: medium\"><strong>Simulation<\/strong> <strong>length<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 86.5px\"><span style=\"font-size: medium\">1<\/span><\/td>\n<td style=\"width: 115.719px\"><span style=\"font-size: medium\">Normal<\/span><\/td>\n<td style=\"width: 131.109px\"><span style=\"font-size: medium\">N\/A<\/span><\/td>\n<td style=\"width: 111.906px\"><span style=\"font-size: medium\">N\/A<\/span><\/td>\n<td style=\"width: 129.531px\"><span style=\"font-size: medium\">23,000<\/span><\/td>\n<td style=\"width: 155.234px\"><span style=\"font-size: medium\">10 min<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 86.5px\"><span style=\"font-size: medium\">2<\/span><\/td>\n<td style=\"width: 115.719px\"><span style=\"font-size: medium\">Mix normal\/malicious<\/span><\/td>\n<td style=\"width: 131.109px\">\n<p><span style=\"font-size: medium\">Targeted\/Basic DOS<\/span><\/p>\n<p><span style=\"font-size: medium\">(Attack 1)<\/span><\/p>\n<\/td>\n<td style=\"width: 111.906px\">\n<p><span style=\"font-size: medium\">rogue terminal (RT0) targets the FCC (RT3) by sending random<\/span><\/p>\n<p><span style=\"font-size: medium\">words in a loop<\/span><\/p>\n<\/td>\n<td style=\"width: 129.531px\"><span style=\"font-size: medium\">148<\/span><\/td>\n<td style=\"width: 155.234px\"><span style=\"font-size: medium\">30 sec<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 86.5px\"><span style=\"font-size: medium\">3<\/span><\/td>\n<td style=\"width: 115.719px\"><span style=\"font-size: medium\">Mix Normal\/malicious<\/span><\/td>\n<td style=\"width: 131.109px\"><span style=\"font-size: medium\">Multi-target DOS (Attack 2)<\/span><\/td>\n<td style=\"width: 111.906px\"><span style=\"font-size: medium\">Rogue terminal (RT0) sends broadcast messages in a loop<\/span><\/td>\n<td style=\"width: 129.531px\"><span style=\"font-size: medium\">373<\/span><\/td>\n<td style=\"width: 155.234px\"><span style=\"font-size: medium\">30 sec<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 86.5px\"><span style=\"font-size: medium\">4<\/span><\/td>\n<td style=\"width: 115.719px\"><span style=\"font-size: medium\">Mix Normal\/malicious<\/span><\/td>\n<td style=\"width: 131.109px\">\n<p><span style=\"font-size: medium\">Subtle Fake data injection<\/span><\/p>\n<p><span style=\"font-size: medium\">(Attack 3)<\/span><\/p>\n<\/td>\n<td style=\"width: 111.906px\">\n<p><span style=\"font-size: medium\">rogue terminal (RT0) replicates one of the messages sent by one of the legitimate RTs by slightly<\/span><\/p>\n<p><span style=\"font-size: medium\">altering one of the data items<\/span><\/p>\n<\/td>\n<td style=\"width: 129.531px\"><span style=\"font-size: medium\">970<\/span><\/td>\n<td style=\"width: 155.234px\"><span style=\"font-size: medium\">30 sec<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 86.5px\"><span style=\"font-size: medium\">5<\/span><\/td>\n<td style=\"width: 115.719px\"><span style=\"font-size: medium\">Mix Normal\/malicious<\/span><\/td>\n<td style=\"width: 131.109px\">\n<p><span style=\"font-size: medium\">Noisy fake data injection<\/span><\/p>\n<p><span style=\"font-size: medium\">(Attack 4)<\/span><\/p>\n<\/td>\n<td style=\"width: 111.906px\">\n<p><span style=\"font-size: medium\">similar to the above attack, except that in this case fake data<\/span><\/p>\n<p><span style=\"font-size: medium\">is randomly generated.<\/span><\/p>\n<\/td>\n<td style=\"width: 129.531px\"><span style=\"font-size: medium\">970<\/span><\/td>\n<td style=\"width: 155.234px\"><span style=\"font-size: medium\">30 sec<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 86.5px\"><span style=\"font-size: medium\">6<\/span><\/td>\n<td style=\"width: 115.719px\"><span style=\"font-size: medium\">Mix Normal\/malicious<\/span><\/td>\n<td style=\"width: 131.109px\"><span style=\"font-size: medium\">Logic attack (Attack 5)<\/span><\/td>\n<td style=\"width: 111.906px\">\n<p><span style=\"font-size: medium\">a rogue RT broadcast mode code value 4 (0x04), which corresponds to the Transmitter<\/span><\/p>\n<p><span style=\"font-size: medium\">Shutdown, which is unusual<\/span><\/p>\n<\/td>\n<td style=\"width: 129.531px\"><span style=\"font-size: medium\">981<\/span><\/td>\n<td style=\"width: 155.234px\"><span style=\"font-size: medium\">30 sec<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 86.5px\"><span style=\"font-size: medium\">7<\/span><\/td>\n<td style=\"width: 115.719px\"><span style=\"font-size: medium\">Mix Normal\/malicious<\/span><\/td>\n<td style=\"width: 131.109px\"><span style=\"font-size: medium\">Hybrid Logic\/fake data injection (Attack 6)<\/span><\/td>\n<td style=\"width: 111.906px\"><span style=\"font-size: medium\">Combination of the attacks in datasets 5 and 6<\/span><\/td>\n<td style=\"width: 129.531px\"><span style=\"font-size: medium\">1004<\/span><\/td>\n<td style=\"width: 155.234px\"><span style=\"font-size: medium\">30 sec<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\"><strong>Table 2. <\/strong>Raw dataset format<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\"><strong>Fields<\/strong><\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\"><strong>Description<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">msgID<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Sequence number associated with the message by the simulator<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">timestamp<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Message timestamp in seconds<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">error<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Indicate whether the error bit of the status word related to the message is set; contains TRUE\/FALSE accordingly.<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">modeCode<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Indicate whether the message is a mode command message; contains TRUE\/FALSE accordingly.<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">channel<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Channel associated with the message<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">connType<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Communication type<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">sa<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Address of sending RT<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">ssa<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Sub-address of the sending subsystem from the sending RT<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">da<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Address of receiving RT<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">dsa<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Sub-address of the receiving subsystem at the receiving RT<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">wc<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Word count: number of data words included in the message<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">modeCode value<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Mode code value when applicable<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">txRsp<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Transmit command response time in ms<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">txSts<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Transmit status word<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">rxRsp<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Receive command response time in ms<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">rxSts<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Receive status word<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px\"><span style=\"font-size: medium\">dw0 \u2026 dw31<\/span><\/td>\n<td style=\"width: 439px\"><span style=\"font-size: medium\">Values of the data word included in the message ranging from dw0 to dw31; N\/A is used when there is no data words for a field.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"123\"><span style=\"font-size: medium\">Malicious<\/span><\/td>\n<td width=\"444\"><span style=\"font-size: medium\">Indication of whether the message is malicious: contains TRUE\/FALSE accordingly.<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"123\"><span style=\"font-size: medium\">injected<\/span><\/td>\n<td width=\"444\">\n<p><span style=\"font-size: medium\">Indication of whether part of the data included in the message is injected:<\/span><\/p>\n<p><span style=\"font-size: medium\">contains TRUE\/FALSE accordingly.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"123\"><span style=\"font-size: medium\">gap<\/span><\/td>\n<td width=\"444\"><span style=\"font-size: medium\">Inter-message gap time in ms<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"123\"><span style=\"font-size: medium\">msgTime<\/span><\/td>\n<td width=\"444\"><span style=\"font-size: medium\">Message time in ms<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\"><strong>To cite this dataset use:<\/strong><\/span><\/p>\n<p><span style=\"font-size: medium\">Hadeer Saad, Issa Traore, Paulo Quinan, Karim Ganame, Oussama Boudar, \u201cA Collection of Datasets for Intrusion Detection in MIL-STD-1553 Platforms\u201d, in Artificial Intelligencefor Cyber- Physical Systems Hardening, I. Traor\u00e9, I. Woungang, and S. Saad, Eds. Springer, 2022, Chapter 4.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Dataset Description Click here to download the ISOT Mil-STD-1553 Dataset ISOT Mil-STD-1553 Dataset The dataset is a combination of datasets collected in a simulated environment consisting of normal activities and a series of attacks against the MIL-STD-1553 databus. The simulation was conducted using Abaco R15-USB-2M USB interface box and Abaco BUSTOOLS\/1553 GUI Software for [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"ISOT Mil-STD-1553 Dataset\r\n\r\nThe dataset is a combination of datasets collected in a simulated environment consisting of normal activities and a series of attacks against the MIL-STD-1553 databus.\r\n\r\nThe simulation was conducted using Abaco R15-USB-2M USB interface box and Abaco BUSTOOLS\/1553 GUI Software for MIL-STD-1553 bus analysis, simulation, and data logging.\r\n\r\nFigure 1 depicts the simulated bus components. The bus architecture used in the simulation consists of a bus monitor (BM) and five different avionic systems, including a flight control computer (FCC) as RT3, a mission computer (MC) as BC, an inertial reference unit (IRU) as RT1, a mission control keyboard (MCK) as RT4, and a multi-function display unit (MFD) as RT2. The MC serves as bus controller (BC), while the remaining components are remote terminals.\r\n\r\n<img class=\"alignnone wp-image-495\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/11\/f-300x139.png\" alt=\"\" width=\"531\" height=\"246\" \/>\r\n\r\n<strong>Figure 1. <\/strong>Simulated MIL-STD-1553 bus components\r\n\r\n\u00a0\r\n\r\nThe components were the only ones used to execute the normal activities. To simulate the attack, we added a rogue terminal as RT0.\r\n\r\nA baseline dataset consisting of normal activities was generated by running the simulation for 10 min. Subsequently, 6 different attack scenarios were run separately against the baseline architecture, by introducing RT0 as rogue terminal. Table 1 provides a summary of the different datasets and Table 2 shows the different fields involved in the raw data. The dataset is provided as separate CSV files.\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n<strong>Table 1. <\/strong>Outline of the collected MIL-STD-1553 datasets\r\n\r\n\u00a0\r\n<table style=\"width: 770px\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 86.5px\"><strong>Dataset<\/strong> <strong>#<\/strong><\/td>\r\n<td style=\"width: 115.719px\"><strong>Type of data<\/strong><\/td>\r\n<td style=\"width: 131.109px\"><strong>Attack type<\/strong><\/td>\r\n<td style=\"width: 111.906px\"><strong>Attack description<\/strong><\/td>\r\n<td style=\"width: 129.531px\"><strong>Number of<\/strong>\r\n\r\n<strong>messages<\/strong><\/td>\r\n<td style=\"width: 155.234px\"><strong>Simulation<\/strong> <strong>length<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 86.5px\">1<\/td>\r\n<td style=\"width: 115.719px\">Normal<\/td>\r\n<td style=\"width: 131.109px\">N\/A<\/td>\r\n<td style=\"width: 111.906px\">N\/A<\/td>\r\n<td style=\"width: 129.531px\">23,000<\/td>\r\n<td style=\"width: 155.234px\">10 min<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 86.5px\">2<\/td>\r\n<td style=\"width: 115.719px\">Mix normal\/malicious<\/td>\r\n<td style=\"width: 131.109px\">Targeted\/Basic DOS\r\n\r\n(Attack 1)<\/td>\r\n<td style=\"width: 111.906px\">rogue terminal (RT0) targets the FCC (RT3) by sending random\r\n\r\nwords in a loop<\/td>\r\n<td style=\"width: 129.531px\">148<\/td>\r\n<td style=\"width: 155.234px\">30 sec<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 86.5px\">3<\/td>\r\n<td style=\"width: 115.719px\">Mix Normal\/malicious<\/td>\r\n<td style=\"width: 131.109px\">Multi-target DOS (Attack 2)<\/td>\r\n<td style=\"width: 111.906px\">Rogue terminal (RT0) sends broadcast messages in a loop<\/td>\r\n<td style=\"width: 129.531px\">373<\/td>\r\n<td style=\"width: 155.234px\">30 sec<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 86.5px\">4<\/td>\r\n<td style=\"width: 115.719px\">Mix Normal\/malicious<\/td>\r\n<td style=\"width: 131.109px\">Subtle Fake data injection\r\n\r\n(Attack 3)<\/td>\r\n<td style=\"width: 111.906px\">rogue terminal (RT0) replicates one of the messages sent by one of the legitimate RTs by slightly\r\n\r\naltering one of the data items<\/td>\r\n<td style=\"width: 129.531px\">970<\/td>\r\n<td style=\"width: 155.234px\">30 sec<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 86.5px\">5<\/td>\r\n<td style=\"width: 115.719px\">Mix Normal\/malicious<\/td>\r\n<td style=\"width: 131.109px\">Noisy fake data injection\r\n\r\n(Attack 4)<\/td>\r\n<td style=\"width: 111.906px\">similar to the above attack, except that in this case fake data\r\n\r\nis randomly generated.<\/td>\r\n<td style=\"width: 129.531px\">970<\/td>\r\n<td style=\"width: 155.234px\">30 sec<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 86.5px\">6<\/td>\r\n<td style=\"width: 115.719px\">Mix Normal\/malicious<\/td>\r\n<td style=\"width: 131.109px\">Logic attack (Attack 5)<\/td>\r\n<td style=\"width: 111.906px\">a rogue RT broadcast mode code value 4 (0x04), which corresponds to the Transmitter\r\n\r\nShutdown, which is unusual<\/td>\r\n<td style=\"width: 129.531px\">981<\/td>\r\n<td style=\"width: 155.234px\">30 sec<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 86.5px\">7<\/td>\r\n<td style=\"width: 115.719px\">Mix Normal\/malicious<\/td>\r\n<td style=\"width: 131.109px\">Hybrid Logic\/fake data injection (Attack 6)<\/td>\r\n<td style=\"width: 111.906px\">Combination of the attacks in datasets 5 and 6<\/td>\r\n<td style=\"width: 129.531px\">1004<\/td>\r\n<td style=\"width: 155.234px\">30 sec<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n\u00a0\r\n\r\n<strong>Table 2. <\/strong>Raw dataset format\r\n\r\n\u00a0\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 136px\"><strong>Fields<\/strong><\/td>\r\n<td style=\"width: 439px\"><strong>Description<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">msgID<\/td>\r\n<td style=\"width: 439px\">Sequence number associated with the message by the simulator<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">timestamp<\/td>\r\n<td style=\"width: 439px\">Message timestamp in seconds<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">error<\/td>\r\n<td style=\"width: 439px\">Indicate whether the error bit of the status word related to the message is set; contains TRUE\/FALSE accordingly.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">modeCode<\/td>\r\n<td style=\"width: 439px\">Indicate whether the message is a mode command message; contains TRUE\/FALSE accordingly.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">channel<\/td>\r\n<td style=\"width: 439px\">Channel associated with the message<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">connType<\/td>\r\n<td style=\"width: 439px\">Communication type<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">sa<\/td>\r\n<td style=\"width: 439px\">Address of sending RT<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">ssa<\/td>\r\n<td style=\"width: 439px\">Sub-address of the sending subsystem from the sending RT<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">da<\/td>\r\n<td style=\"width: 439px\">Address of receiving RT<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">dsa<\/td>\r\n<td style=\"width: 439px\">Sub-address of the receiving subsystem at the receiving RT<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">wc<\/td>\r\n<td style=\"width: 439px\">Word count: number of data words included in the message<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">modeCode value<\/td>\r\n<td style=\"width: 439px\">Mode code value when applicable<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">txRsp<\/td>\r\n<td style=\"width: 439px\">Transmit command response time in ms<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">txSts<\/td>\r\n<td style=\"width: 439px\">Transmit status word<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">rxRsp<\/td>\r\n<td style=\"width: 439px\">Receive command response time in ms<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">rxSts<\/td>\r\n<td style=\"width: 439px\">Receive status word<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 136px\">dw0 \u2026 dw31<\/td>\r\n<td style=\"width: 439px\">Values of the data word included in the message ranging from dw0 to dw31; N\/A is used when there is no data words for a field.<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n\u00a0\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td width=\"123\">Malicious<\/td>\r\n<td width=\"444\">Indication of whether the message is malicious: contains TRUE\/FALSE accordingly.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"123\">injected<\/td>\r\n<td width=\"444\">Indication of whether part of the data included in the message is injected:\r\n\r\ncontains TRUE\/FALSE accordingly.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"123\">gap<\/td>\r\n<td width=\"444\">Inter-message gap time in ms<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"123\">msgTime<\/td>\r\n<td width=\"444\">Message time in ms<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n<strong>To cite this dataset use:<\/strong>\r\n\r\nHadeer Saad, Issa Traore, Paulo Quinan, Karim Ganame, Oussama Boudar, \u201cA Collection of Datasets for Intrusion Detection in MIL-STD-1553 Platforms\u201d, in Artificial Intelligencefor Cyber- Physical Systems Hardening, I. Traor\u00e9, I. Woungang, and S. Saad, Eds. Springer, 2022, Chapter 4.","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11],"tags":[],"class_list":["post-493","post","type-post","status-publish","format-standard","hentry","category-datasets"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=493"}],"version-history":[{"count":12,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/493\/revisions"}],"predecessor-version":[{"id":1372,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/493\/revisions\/1372"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}