This project [1] produced two types of data: Working Data and Derived Data. The Working Data includes raw measurements collected from a Radio Access Network (RAN) utilizing commercial-off-the-shelf (COTS) hardware. These measurements were gathered at multiple layers of the Long-Term Evolution (LTE) protocol stack within the RAN, in both a baseline state with encrypted data and an anomalous state with encryption disabled. The data is provided in comma-separated value (.csv) format.The Working Data was then processed into Derived Data using Python 3 scripts that performed statistical analyses to explore data distributions. The Derived Data is also available in .csv files. Additionally, human-readable spreadsheets are included, offering measurement notes and definitions related to the Working Data. Please note that the data set is divided into three distinct tranches, or sections, in alignment with the project's design of experiment.[1] M. Frey, T. Evans, A. Folz, M. Gregg, J. Quimby, J. Rezac. ?Anomalous state detection in radio access networks: A proof-of-concept.? Journal of Network and Computer Applications. Volume 231, 2024, https://doi.org/10.1016/j.jnca.2024.103979.
About this Dataset
Title | Radio Access Network Anomalous State Detection Dataset |
---|---|
Description | This project [1] produced two types of data: Working Data and Derived Data. The Working Data includes raw measurements collected from a Radio Access Network (RAN) utilizing commercial-off-the-shelf (COTS) hardware. These measurements were gathered at multiple layers of the Long-Term Evolution (LTE) protocol stack within the RAN, in both a baseline state with encrypted data and an anomalous state with encryption disabled. The data is provided in comma-separated value (.csv) format.The Working Data was then processed into Derived Data using Python 3 scripts that performed statistical analyses to explore data distributions. The Derived Data is also available in .csv files. Additionally, human-readable spreadsheets are included, offering measurement notes and definitions related to the Working Data. Please note that the data set is divided into three distinct tranches, or sections, in alignment with the project's design of experiment.[1] M. Frey, T. Evans, A. Folz, M. Gregg, J. Quimby, J. Rezac. ?Anomalous state detection in radio access networks: A proof-of-concept.? Journal of Network and Computer Applications. Volume 231, 2024, https://doi.org/10.1016/j.jnca.2024.103979. |
Modified | 2024-07-05 00:00:00 |
Publisher Name | National Institute of Standards and Technology |
Contact | mailto:[email protected] |
Keywords | Anomalous state detection , cellular communication security , measurement stability , metrology , multi-feature detection , multi-layer architecture , radio access network. |
{ "identifier": "ark:\/88434\/mds2-3430", "accessLevel": "public", "contactPoint": { "hasEmail": "mailto:[email protected]", "fn": "Jeanne Quimby" }, "programCode": [ "006:045" ], "landingPage": "https:\/\/data.nist.gov\/od\/id\/mds2-3430", "title": "Radio Access Network Anomalous State Detection Dataset", "description": "This project [1] produced two types of data: Working Data and Derived Data. The Working Data includes raw measurements collected from a Radio Access Network (RAN) utilizing commercial-off-the-shelf (COTS) hardware. These measurements were gathered at multiple layers of the Long-Term Evolution (LTE) protocol stack within the RAN, in both a baseline state with encrypted data and an anomalous state with encryption disabled. The data is provided in comma-separated value (.csv) format.The Working Data was then processed into Derived Data using Python 3 scripts that performed statistical analyses to explore data distributions. The Derived Data is also available in .csv files. Additionally, human-readable spreadsheets are included, offering measurement notes and definitions related to the Working Data. Please note that the data set is divided into three distinct tranches, or sections, in alignment with the project's design of experiment.[1]\u00a0M. Frey, T. Evans, A. Folz, M. Gregg, J. Quimby, J. Rezac. ?Anomalous\u00a0state detection in radio access networks: A proof-of-concept.?\u00a0Journal of Network and Computer Applications. Volume 231, 2024,\u00a0https:\/\/doi.org\/10.1016\/j.jnca.2024.103979.", "language": [ "en" ], "distribution": [ { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3430\/DARE_Data_Public\/Full_dataset\/Measurands_and_Measurement_Terms.xlsx", "mediaType": "application\/vnd.openxmlformats-officedocument.spreadsheetml.sheet" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3430\/DARE_Data_Public\/Full_dataset\/variable_name_key.csv.sha256", "mediaType": "text\/plain" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3430\/DARE_Data_Public\/Full_dataset\/Tranche_C.zip", "mediaType": "application\/zip" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3430\/DARE_Data_Public\/Full_dataset\/Tranche_A.zip", "mediaType": "application\/zip" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3430\/DARE_Data_Public\/Full_dataset\/Tranche_B.zip", "mediaType": "application\/zip" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3430\/Data%20Guide%20for%20a%20Radio%20Access%20Network%20Anomalous%20State%20Detection%20Experiment.pdf", "description": "A proof-of-concept experiment for anomalous state detection on a radio access network (RAN) was conducted. Its results demonstrate that an anomalous long-term evolution RAN state can be detected at different layers in the network architecture. The data from this experiment are publicly available. Documented here are the experiment design, the processing of the collected data, and their format. Examples of raw data and processed output are given.", "mediaType": "application\/pdf", "title": "Data Guide for a Radio Access Network Anomalous State Detection Experiment" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3430\/DARE_Data_Public%2FFull_dataset%2FTranche_A.zip", "mediaType": "application\/zip", "title": "DARE_Data_Public\/Full_dataset\/Tranche_A" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3430\/DARE_Data_Public%2FFull_dataset%2FTranche_C.zip", "mediaType": "application\/zip", "title": "DARE_Data_Public\/Full_dataset\/Tranche_C" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3430\/DARE_Data_Public%2FFull_dataset%2FTranche_B.zip", "mediaType": "application\/zip", "title": "DARE_Data_Public\/Full_dataset\/Tranche_B" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3430\/DARE_Data_Public%2FFull_dataset%2Fvariable_name_key.csv", "mediaType": "text\/csv", "title": "DARE_Data_Public\/Full_dataset\/variable_name_key" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3430\/DARE_Data_Public%2FFull_dataset%2FMeasurands_and_Measurement_Terms.xlsx", "mediaType": "application\/vnd.openxmlformats-officedocument.spreadsheetml.sheet", "title": "DARE_Data_Public\/Full_dataset\/Measurands_and_Measurement_Terms" } ], "bureauCode": [ "006:55" ], "modified": "2024-07-05 00:00:00", "publisher": { "@type": "org:Organization", "name": "National Institute of Standards and Technology" }, "theme": [ "Advanced Communications:Wireless (RF)" ], "keyword": [ "Anomalous state detection", "cellular communication security", "measurement stability", "metrology", "multi-feature detection", "multi-layer architecture", "radio access network." ] }