Difference between revisions of "On ship data traffic"

From OpenScience
Jump to: navigation, search
(Data)
Line 22: Line 22:
 
** Decoded NMEA 0183 messages: https://opsci.informatik.uni-rostock.de/repos/datasets/ship-limanda/gz/decoded/2023-08-11-ossis_public_nmea0183_messages.sql.gz (32 MB, 312.8 MB unzipped)
 
** Decoded NMEA 0183 messages: https://opsci.informatik.uni-rostock.de/repos/datasets/ship-limanda/gz/decoded/2023-08-11-ossis_public_nmea0183_messages.sql.gz (32 MB, 312.8 MB unzipped)
 
** Decoded NMEA 2000 messages: https://opsci.informatik.uni-rostock.de/repos/datasets/ship-limanda/gz/decoded/2023-08-11-ossis_public_nmea2k_messages.sql.gz (93 MB, 1.3 GB unzipped)
 
** Decoded NMEA 2000 messages: https://opsci.informatik.uni-rostock.de/repos/datasets/ship-limanda/gz/decoded/2023-08-11-ossis_public_nmea2k_messages.sql.gz (93 MB, 1.3 GB unzipped)
 
== KNX ==
 
 
{| {{Prettytable}}
 
!ID
 
!File
 
!Reference_ID
 
!Author E-Mail
 
!Notes
 
|-
 
|1
 
|https://opsci.informatik.uni-rostock.de/repos/datasets/fieldbus-traffic/knx/attack_free_referencedataset_with_seconds_csv.zip
 
https://opsci.informatik.uni-rostock.de/repos/datasets/fieldbus-traffic/knx/attack_free_referencedataset_with_seconds_json.zip
 
|1
 
|[[User:sw674|Simeon Wiedenmann]]
 
|A log of normal KNX traffic without any attacks in csv / json format
 
Zip compressed CSV-file 14,3 MB (uncompressed 302,5 MB) CC BY-SA 4.0
 
(CSV: Line Separator = LF, Enclosing Strings in = ", Field Separator = ; )
 
 
Zip compressed JSON-file 20,8 MB (uncompressed 817,7 MB) CC BY-SA 4.0
 
 
Due to too low timestamp resolution in our log-mechanisms the time stamps are only accurate to the second, which is unfortunate. However the temporal order of the telegrams still can be determined by the correctly set sequence_number. For telegrams with identical timestamps, those with lower sequence_number happened earlier.
 
|-
 
|2
 
|https://opsci.informatik.uni-rostock.de/repos/datasets/fieldbus-traffic/knx/attacks_with_seconds_csv.zip
 
https://opsci.informatik.uni-rostock.de/repos/datasets/fieldbus-traffic/knx/attacks_with_seconds_json.zip
 
|1
 
|[[User:sw674|Simeon Wiedenmann]]
 
|A log of KNX traffic with artificially introduced attack telegrams deduced from ID = 1 following this [https://opsci.informatik.uni-rostock.de/repos/datasets/fieldbus-traffic/knx/creationprocess_of_attacks_table_script.sql documentation and creation script]. Introduced attacks are documented at the bottom of that file and include manipulated hop_count values, new source_addresses, time shifted telegrams, replay attacks, negation attacks and the deletion of telegrams.
 
Due to too low timestamp resolution in our log-mechanisms the time stamps are only accurate to the second, which is unfortunate. However the temporal order of the telegrams still can be determined by the correctly set sequence_number. For telegrams with identical timestamps, those with lower sequence_number happened earlier.
 
|-
 
|3
 
|https://opsci.informatik.uni-rostock.de/repos/datasets/fieldbus-traffic/knx/replay_telegrams.zip
 
https://opsci.informatik.uni-rostock.de/repos/datasets/fieldbus-traffic/knx/negation_telegrams.zip
 
|2 and 1
 
|[[User:sw674|Simeon Wiedenmann]]
 
|These zip files contain csv and json versions of tables that contain certain telegrams that have been introduced into ID = 2 (attacks_with_seconds). In case one wants to match sequence_numbers of telegrams from attacks_with_seconds with those from attack_free_referencedataset_with_seconds, the following applies:
 
-- For attacks of type 4: Table replay_telegrams shows the same telegrams that have been introduced into attacks_with_seconds but with the original sequence_number as in attack_free_referencedataset_with_seconds.
 
-- For attacks of type 5: Table negation_telegrams shows the same telegrams that have been introduced into attacks_with_seconds but with the original sequence_number as in attack_free_referencedataset_with_seconds.
 
|-
 
|}
 
 
== Other Systems ==
 
 
Do you have any traffic for CAN, Profibus, Foundation Fieldbus, LON, EIA-485, RS-485 or any other fieldbus technology to offer, please contact [[User:sw674|Simeon Wiedenmann]]
 
 
=== Licence ===
 
All test cases of this benchmark collection are licensed under the Free Culture License CC BY-SA 4.0 (see [https://creativecommons.org/licenses/] for more infos). When using individual test cases the test case author as well as this benchmark collection need to be named: e.g. Test Case by <author> published via [https://opsci.informatik.uni-rostock.de/index.php/Fieldbus_traffic_simulation_logs]
 
 
<gallery mode="packed" widths=80px heights=80px>
 
File:Cc.large.png|CC
 
File:By.large.png|BY
 
File:Sa.large.png|SA
 
</gallery>
 
 
=== Publications ===
 
* [https://ieeexplore.ieee.org/document/8631474 Designing and Implementing a Benchmark Collection for Attack Simulation in Field bus Systems]
 

Revision as of 14:49, 2 April 2024

Project Description

NMEA 0183, NMEA 2000 and CAN bus data collected on board of the University of Rostock research vessel Limanda on 2023/08/11.

Additional data from 2023/06/06 to 2023/10/04 can be provided and distributed on request.

Contact contributors

Datasets

Data