CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set

datacite.relation.isPartOf https://doi.org/10.1109/ACSAC67867.2025.00069
dc.contributor.author Hamborg, Jannis
dc.contributor.author Hellemans, Wouter
dc.contributor.author Lauser, Timm
dc.contributor.author Rabbani, Md Masoom
dc.contributor.author Preneel, Bart
dc.contributor.author Krauß, Christoph
dc.contributor.author Mentens, Nele
dc.date.accessioned 2026-03-25T07:43:59Z
dc.date.created 2026-03-23
dc.date.issued 2026-03-25
dc.description The CarDS dataset is a multi-protocol in-vehicle network dataset primarily targeted at the development of Intrusion Detection Systems (IDSs). It presents both benign traffic as well as advanced attacks launched against the in-vehicle network of a modern commercial electric vehicle from 2020 consisting of 10 internal CAN buses (i.e., domains) and 6 Automotive Ethernet buses. Specifically, the dataset covers 9h07m09s of real in-vehicle network data and features 397,383,125 CAN (CAN CC and CAN FD) and 180,604,377 Automotive Ethernet messages distributed over different scenarios in 258 traces. <p> If you find this useful in your research, please consider citing: @inproceedings{hellemans2025cards, title={CarDS-Controller Area Network and Automotive Ethernet Realistic Data Set}, author={Hellemans, Wouter and Hamborg, Jannis and Lauser, Timm and Rabbani, Md Masoom and Preneel, Bart and Krau{\ss}, Christoph and Mentens, Nele}, booktitle={2025 IEEE Annual Computer Security Applications Conference (ACSAC)}, pages={798--814}, year={2025}, organization={IEEE} } # Data Privacy and Intellectual Property Statement To ensure the ethical and legal publication of this dataset, we have implemented a multi-stage pseudonymization pipeline: - CAN and Ethernet Pseudonymization: The MAC and IP address-headers and all ICMP communications and metadata headers have been pseudonymized to hide specific network topology identifiers. - PII & Vehicle Identity: The Vehicle Identification Number (VIN) has been replaced with a synthetic identifier. While the data was recorded from a dedicated research vehicle, this step ensures compliance with global privacy standards regarding Personal Identifiable Information (PII). - Manufacturer De-identification: We have removed explicit references to the Original Equipment Manufacturer (OEM) to focus the research strictly on the underlying electronic control unit (ECU) behaviors and security protocols. - No Proprietary Interpretations: To respect Intellectual Property, we are not publishing any reverse-engineered documentation, signal definitions, or DBC files. The dataset consists purely of raw payloads. - Attack Payload Safety: Attack vectors included in the dataset have been modified. This ensures that while the security patterns are visible for research and detection modeling, the payloads cannot be directly replayed to execute critical functions on production vehicles. We believe these measures provide a high-fidelity dataset for the cybersecurity community while rigorously protecting the safety and IP of the automotive ecosystem. # Data Takedown & Ethical Use Policy ## 1. Our Commitment The authors of this dataset are committed to responsible open-science practices. While we have performed extensive pseudonymization to remove Personal Identifiable Information (PII) and proprietary manufacturer metadata, we recognize the complexity of automotive network traffic. Our goal is to support cybersecurity research without compromising vehicle safety or corporate Intellectual Property (IP). ## 2. Grounds for a Takedown Request We will review and act upon legitimate requests for data removal or further pseudonymization based on the following criteria: - Privacy Violations: Identification of previously undetected PII (e.g., a leaked VIN, GNSS coordinates, or user-specific data). - Safety Risks: Evidence that specific attack payloads in the dataset pose a direct, high-risk safety threat that exceeds the threshold for educational or defensive research. - Intellectual Property: Significant evidence that the raw data contains proprietary structures that constitute protected trade secrets, beyond standard protocol implementations. ## 3. How to Submit a Request If you represent an OEM, a Tier-1 supplier, or are an individual who has identified sensitive data within this set, please contact us at: - Contact Email: cards-dataset@fbi.h-da.de - Subject Line: Dataset Takedown Request - CarDS-Dataset Please include the following in your request: - The specific file(s) and timestamp/log-line references. - A brief description of the nature of the concern (Privacy, Safety, or IP). - Your affiliation and contact information. ## 4. Our Process Upon receipt of a valid concern, we will: - Acknowledge: Confirm receipt of your request within 5 business days. - Evaluate: Assess the identified data. During this period, we may temporarily set the dataset to "Private" or "Restricted Access" if the risk is deemed high. - Remediate: If the request is valid, we will scrub the sensitive portions and issue a new, sanitized version of the dataset, or remove the specific logs in question.
dc.identifier.uri https://tudatalib.ulb.tu-darmstadt.de/handle/tudatalib/5080
dc.identifier.uri https://doi.org/10.48328/tudatalib-2179
dc.language.iso en
dc.rights CC-BY-SA-4.0 - Attribution-ShareAlike 4.0 International
dc.rights.licenseother
dc.rights.uri https://creativecommons.org/licenses/by-sa/4.0/
dc.subject Automotive
dc.subject In-Vehicle Network
dc.subject Cybersecurity
dc.subject Intrusion Detection
dc.subject.classification 4.43-03
dc.subject.ddc 004
dc.title CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set
dc.type Dataset
dcterms.accessRights openAccess
person.identifier.orcid #PLACEHOLDER_PARENT_METADATA_VALUE#
person.identifier.orcid #PLACEHOLDER_PARENT_METADATA_VALUE#
person.identifier.orcid #PLACEHOLDER_PARENT_METADATA_VALUE#
person.identifier.orcid #PLACEHOLDER_PARENT_METADATA_VALUE#
person.identifier.orcid #PLACEHOLDER_PARENT_METADATA_VALUE#
person.identifier.orcid #PLACEHOLDER_PARENT_METADATA_VALUE#
person.identifier.orcid #PLACEHOLDER_PARENT_METADATA_VALUE#
tuda.agreements true
tuda.unit HDA

Files

Original bundle

Now showing 1 - 9 of 9
NameDescriptionSizeFormat
00_README.md20.71 KBUnknown data format Download
Attack_Identifiers.pdf177.1 KBAdobe Portable Document Format Download
cards_architecture.png174.5 KBPortable Network Graphics Download
cards_measurement_setup.png89.14 KBPortable Network Graphics Download
DISCLAIMER.md3.56 KBUnknown data format Download
LICENSE.txt20.08 KBPlain Text Download
CAN.zip3.38 GBZIP-Archivdateien Download
curated.zip4.94 GBZIP-Archivdateien Download
Ethernet.zip18.45 GBZIP-Archivdateien Download

Collections