RTPS Attack Dataset Description Article Swipe
Dong Young Kim
,
Dong-Sung Kim
,
Yuchan Song
,
Gang Min Kim
,
Min Geun Song
,
Jeong Yoo
,
Huy Kang Kim
·
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2311.14496
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2311.14496
This paper explains all about our RTPS datasets. We collect malicious/benign packet data by injecting attack data in an Unmanned Ground Vehicle (UGV) in the normal state. We assembled the testbed, consisting of UGV, Controller, PC, and Router. We collect this dataset in the UGV part of our testbed. We conducted two types of attack "Command Injection" and "Command Injection with ARP Spoofing" on our testbed. The data collection time is 180, 300, 600, and 1200. The scenario has 30 each on collection time, 240 total. We expect this dataset to contribute to the development of defense technologies like anomaly detection to address security threat issues in ROS2 networks and Fast-DDS implements.
Related Topics
Concepts
Metadata
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2311.14496
- https://arxiv.org/pdf/2311.14496
- OA Status
- green
- Cited By
- 1
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4389115127
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4389115127Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2311.14496Digital Object Identifier
- Title
-
RTPS Attack Dataset DescriptionWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-11-24Full publication date if available
- Authors
-
Dong Young Kim, Dong-Sung Kim, Yuchan Song, Gang Min Kim, Min Geun Song, Jeong Yoo, Huy Kang KimList of authors in order
- Landing page
-
https://arxiv.org/abs/2311.14496Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2311.14496Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2311.14496Direct OA link when available
- Concepts
-
Testbed, Computer science, Spoofing attack, Network packet, Router, Real-time computing, Anomaly detection, Controller (irrigation), Unmanned ground vehicle, Computer security, Computer network, Data mining, Artificial intelligence, Biology, AgronomyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 1Per-year citation counts (last 5 years)
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4389115127 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2311.14496 |
| ids.doi | https://doi.org/10.48550/arxiv.2311.14496 |
| ids.openalex | https://openalex.org/W4389115127 |
| fwci | |
| type | preprint |
| title | RTPS Attack Dataset Description |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9994000196456909 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T10761 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9925000071525574 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Vehicular Ad Hoc Networks (VANETs) |
| topics[2].id | https://openalex.org/T10917 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9842000007629395 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2207 |
| topics[2].subfield.display_name | Control and Systems Engineering |
| topics[2].display_name | Smart Grid Security and Resilience |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C31395832 |
| concepts[0].level | 2 |
| concepts[0].score | 0.96638423204422 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1318674 |
| concepts[0].display_name | Testbed |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.800628662109375 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C167900197 |
| concepts[2].level | 2 |
| concepts[2].score | 0.7783348560333252 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11081100 |
| concepts[2].display_name | Spoofing attack |
| concepts[3].id | https://openalex.org/C158379750 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5502996444702148 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[3].display_name | Network packet |
| concepts[4].id | https://openalex.org/C2775896111 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5402171015739441 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q642560 |
| concepts[4].display_name | Router |
| concepts[5].id | https://openalex.org/C79403827 |
| concepts[5].level | 1 |
| concepts[5].score | 0.481145977973938 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[5].display_name | Real-time computing |
| concepts[6].id | https://openalex.org/C739882 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4597397744655609 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3560506 |
| concepts[6].display_name | Anomaly detection |
| concepts[7].id | https://openalex.org/C203479927 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4405301511287689 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q5165939 |
| concepts[7].display_name | Controller (irrigation) |
| concepts[8].id | https://openalex.org/C2776548393 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4245336055755615 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q2031473 |
| concepts[8].display_name | Unmanned ground vehicle |
| concepts[9].id | https://openalex.org/C38652104 |
| concepts[9].level | 1 |
| concepts[9].score | 0.3818334639072418 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[9].display_name | Computer security |
| concepts[10].id | https://openalex.org/C31258907 |
| concepts[10].level | 1 |
| concepts[10].score | 0.33806881308555603 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[10].display_name | Computer network |
| concepts[11].id | https://openalex.org/C124101348 |
| concepts[11].level | 1 |
| concepts[11].score | 0.2460903823375702 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[11].display_name | Data mining |
| concepts[12].id | https://openalex.org/C154945302 |
| concepts[12].level | 1 |
| concepts[12].score | 0.21419885754585266 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[12].display_name | Artificial intelligence |
| concepts[13].id | https://openalex.org/C86803240 |
| concepts[13].level | 0 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[13].display_name | Biology |
| concepts[14].id | https://openalex.org/C6557445 |
| concepts[14].level | 1 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q173113 |
| concepts[14].display_name | Agronomy |
| keywords[0].id | https://openalex.org/keywords/testbed |
| keywords[0].score | 0.96638423204422 |
| keywords[0].display_name | Testbed |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.800628662109375 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/spoofing-attack |
| keywords[2].score | 0.7783348560333252 |
| keywords[2].display_name | Spoofing attack |
| keywords[3].id | https://openalex.org/keywords/network-packet |
| keywords[3].score | 0.5502996444702148 |
| keywords[3].display_name | Network packet |
| keywords[4].id | https://openalex.org/keywords/router |
| keywords[4].score | 0.5402171015739441 |
| keywords[4].display_name | Router |
| keywords[5].id | https://openalex.org/keywords/real-time-computing |
| keywords[5].score | 0.481145977973938 |
| keywords[5].display_name | Real-time computing |
| keywords[6].id | https://openalex.org/keywords/anomaly-detection |
| keywords[6].score | 0.4597397744655609 |
| keywords[6].display_name | Anomaly detection |
| keywords[7].id | https://openalex.org/keywords/controller |
| keywords[7].score | 0.4405301511287689 |
| keywords[7].display_name | Controller (irrigation) |
| keywords[8].id | https://openalex.org/keywords/unmanned-ground-vehicle |
| keywords[8].score | 0.4245336055755615 |
| keywords[8].display_name | Unmanned ground vehicle |
| keywords[9].id | https://openalex.org/keywords/computer-security |
| keywords[9].score | 0.3818334639072418 |
| keywords[9].display_name | Computer security |
| keywords[10].id | https://openalex.org/keywords/computer-network |
| keywords[10].score | 0.33806881308555603 |
| keywords[10].display_name | Computer network |
| keywords[11].id | https://openalex.org/keywords/data-mining |
| keywords[11].score | 0.2460903823375702 |
| keywords[11].display_name | Data mining |
| keywords[12].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[12].score | 0.21419885754585266 |
| keywords[12].display_name | Artificial intelligence |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2311.14496 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2311.14496 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2311.14496 |
| locations[1].id | doi:10.48550/arxiv.2311.14496 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2311.14496 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5100668101 |
| authorships[0].author.orcid | https://orcid.org/0009-0005-5449-889X |
| authorships[0].author.display_name | Dong Young Kim |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Kim, Dong Young |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5072697207 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-4152-628X |
| authorships[1].author.display_name | Dong-Sung Kim |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Kim, Dongsung |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5102405937 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Yuchan Song |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Song, Yuchan |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5063195889 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Gang Min Kim |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Kim, Gang Min |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5109117346 |
| authorships[4].author.orcid | https://orcid.org/0009-0009-1133-9783 |
| authorships[4].author.display_name | Min Geun Song |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Song, Min Geun |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5090433388 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-4269-6953 |
| authorships[5].author.display_name | Jeong Yoo |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Yoo, Jeong Do |
| authorships[5].is_corresponding | False |
| authorships[6].author.id | https://openalex.org/A5091602017 |
| authorships[6].author.orcid | https://orcid.org/0000-0002-0760-8807 |
| authorships[6].author.display_name | Huy Kang Kim |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Kim, Huy Kang |
| authorships[6].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2311.14496 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | RTPS Attack Dataset Description |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9994000196456909 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2883256816, https://openalex.org/W2171408034, https://openalex.org/W3003320923, https://openalex.org/W2106140982, https://openalex.org/W2152313554, https://openalex.org/W2064303750, https://openalex.org/W1509300825, https://openalex.org/W3092582874, https://openalex.org/W2054620577, https://openalex.org/W3048672182 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2311.14496 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2311.14496 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2311.14496 |
| primary_location.id | pmh:oai:arXiv.org:2311.14496 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2311.14496 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2311.14496 |
| publication_date | 2023-11-24 |
| publication_year | 2023 |
| referenced_works_count | 0 |
| abstract_inverted_index.30 | 79 |
| abstract_inverted_index.We | 8, 27, 38, 49, 86 |
| abstract_inverted_index.an | 18 |
| abstract_inverted_index.by | 13 |
| abstract_inverted_index.in | 17, 23, 42, 106 |
| abstract_inverted_index.is | 70 |
| abstract_inverted_index.of | 32, 46, 53, 95 |
| abstract_inverted_index.on | 63, 81 |
| abstract_inverted_index.to | 90, 92, 101 |
| abstract_inverted_index.240 | 84 |
| abstract_inverted_index.ARP | 61 |
| abstract_inverted_index.PC, | 35 |
| abstract_inverted_index.The | 66, 76 |
| abstract_inverted_index.UGV | 44 |
| abstract_inverted_index.all | 3 |
| abstract_inverted_index.and | 36, 57, 74, 109 |
| abstract_inverted_index.has | 78 |
| abstract_inverted_index.our | 5, 47, 64 |
| abstract_inverted_index.the | 24, 29, 43, 93 |
| abstract_inverted_index.two | 51 |
| abstract_inverted_index.180, | 71 |
| abstract_inverted_index.300, | 72 |
| abstract_inverted_index.600, | 73 |
| abstract_inverted_index.ROS2 | 107 |
| abstract_inverted_index.RTPS | 6 |
| abstract_inverted_index.This | 0 |
| abstract_inverted_index.UGV, | 33 |
| abstract_inverted_index.data | 12, 16, 67 |
| abstract_inverted_index.each | 80 |
| abstract_inverted_index.like | 98 |
| abstract_inverted_index.part | 45 |
| abstract_inverted_index.this | 40, 88 |
| abstract_inverted_index.time | 69 |
| abstract_inverted_index.with | 60 |
| abstract_inverted_index.(UGV) | 22 |
| abstract_inverted_index.1200. | 75 |
| abstract_inverted_index.about | 4 |
| abstract_inverted_index.paper | 1 |
| abstract_inverted_index.time, | 83 |
| abstract_inverted_index.types | 52 |
| abstract_inverted_index.Ground | 20 |
| abstract_inverted_index.attack | 15, 54 |
| abstract_inverted_index.expect | 87 |
| abstract_inverted_index.issues | 105 |
| abstract_inverted_index.normal | 25 |
| abstract_inverted_index.packet | 11 |
| abstract_inverted_index.state. | 26 |
| abstract_inverted_index.threat | 104 |
| abstract_inverted_index.total. | 85 |
| abstract_inverted_index.Router. | 37 |
| abstract_inverted_index.Vehicle | 21 |
| abstract_inverted_index.address | 102 |
| abstract_inverted_index.anomaly | 99 |
| abstract_inverted_index.collect | 9, 39 |
| abstract_inverted_index.dataset | 41, 89 |
| abstract_inverted_index.defense | 96 |
| abstract_inverted_index."Command | 55, 58 |
| abstract_inverted_index.Fast-DDS | 110 |
| abstract_inverted_index.Unmanned | 19 |
| abstract_inverted_index.explains | 2 |
| abstract_inverted_index.networks | 108 |
| abstract_inverted_index.scenario | 77 |
| abstract_inverted_index.security | 103 |
| abstract_inverted_index.testbed, | 30 |
| abstract_inverted_index.testbed. | 48, 65 |
| abstract_inverted_index.Injection | 59 |
| abstract_inverted_index.Spoofing" | 62 |
| abstract_inverted_index.assembled | 28 |
| abstract_inverted_index.conducted | 50 |
| abstract_inverted_index.datasets. | 7 |
| abstract_inverted_index.detection | 100 |
| abstract_inverted_index.injecting | 14 |
| abstract_inverted_index.Injection" | 56 |
| abstract_inverted_index.collection | 68, 82 |
| abstract_inverted_index.consisting | 31 |
| abstract_inverted_index.contribute | 91 |
| abstract_inverted_index.Controller, | 34 |
| abstract_inverted_index.development | 94 |
| abstract_inverted_index.implements. | 111 |
| abstract_inverted_index.technologies | 97 |
| abstract_inverted_index.malicious/benign | 10 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 7 |
| citation_normalized_percentile |