Return to search results
Radio Access Network Anomalous State Detection Dataset
This project [1] produced two types of data: Working Data and Derived Data. The Working Data includes raw measurements collected from a Radio Access Network (RAN) utilizing commercial-off-the-shelf (COTS) hardware. These measurements were gathered at multiple layers of the Long-Term Evolution (LTE) protocol stack within the RAN, in both a baseline state with encrypted data and an anomalous state with encryption disabled. The data is provided in comma-separated value (.csv) format.The Working Data was then processed into Derived Data using Python 3 scripts that performed statistical analyses to explore data distributions. The Derived Data is also available in .csv files. Additionally, human-readable spreadsheets are included, offering measurement notes and definitions related to the Working Data. Please note that the data set is divided into three distinct tranches, or sections, in alignment with the project's design of experiment.[1] M. Frey, T. Evans, A. Folz, M. Gregg, J. Quimby, J. Rezac. ?Anomalous state detection in radio access networks: A proof-of-concept.? Journal of Network and Computer Applications. Volume 231, 2024, https://doi.org/10.1016/j.jnca.2024.103979.
Complete Metadata
| @type | dcat:Dataset |
|---|---|
| accessLevel | public |
| accrualPeriodicity | irregular |
| bureauCode |
[
"006:55"
]
|
| contactPoint |
{
"fn": "Jeanne Quimby",
"hasEmail": "mailto:jeanne.quimby@nist.gov"
}
|
| description | This project [1] produced two types of data: Working Data and Derived Data. The Working Data includes raw measurements collected from a Radio Access Network (RAN) utilizing commercial-off-the-shelf (COTS) hardware. These measurements were gathered at multiple layers of the Long-Term Evolution (LTE) protocol stack within the RAN, in both a baseline state with encrypted data and an anomalous state with encryption disabled. The data is provided in comma-separated value (.csv) format.The Working Data was then processed into Derived Data using Python 3 scripts that performed statistical analyses to explore data distributions. The Derived Data is also available in .csv files. Additionally, human-readable spreadsheets are included, offering measurement notes and definitions related to the Working Data. Please note that the data set is divided into three distinct tranches, or sections, in alignment with the project's design of experiment.[1] M. Frey, T. Evans, A. Folz, M. Gregg, J. Quimby, J. Rezac. ?Anomalous state detection in radio access networks: A proof-of-concept.? Journal of Network and Computer Applications. Volume 231, 2024, https://doi.org/10.1016/j.jnca.2024.103979. |
| distribution |
[
{
"title": "Data Guide for a Radio Access Network Anomalous State Detection Experiment",
"mediaType": "application/pdf",
"description": "A proof-of-concept experiment for anomalous state detection on a radio access network (RAN) was conducted. Its results demonstrate that an anomalous long-term evolution RAN state can be detected at different layers in the network architecture. The data from this experiment are publicly available. Documented here are the experiment design, the processing of the collected data, and their format. Examples of raw data and processed output are given.",
"downloadURL": "https://data.nist.gov/od/ds/mds2-3430/Data%20Guide%20for%20a%20Radio%20Access%20Network%20Anomalous%20State%20Detection%20Experiment.pdf"
},
{
"mediaType": "application/vnd.openxmlformats-officedocument.spreadsheetml.sheet",
"downloadURL": "https://data.nist.gov/od/ds/ark:/88434/mds2-3430/DARE_Data_Public/Full_dataset/Measurands_and_Measurement_Terms.xlsx"
},
{
"mediaType": "application/zip",
"downloadURL": "https://data.nist.gov/od/ds/ark:/88434/mds2-3430/DARE_Data_Public/Full_dataset/Tranche_A.zip"
},
{
"mediaType": "application/zip",
"downloadURL": "https://data.nist.gov/od/ds/ark:/88434/mds2-3430/DARE_Data_Public/Full_dataset/Tranche_B.zip"
},
{
"mediaType": "application/zip",
"downloadURL": "https://data.nist.gov/od/ds/ark:/88434/mds2-3430/DARE_Data_Public/Full_dataset/Tranche_C.zip"
},
{
"mediaType": "text/plain",
"downloadURL": "https://data.nist.gov/od/ds/ark:/88434/mds2-3430/DARE_Data_Public/Full_dataset/variable_name_key.csv.sha256"
},
{
"title": "DARE_Data_Public/Full_dataset/Measurands_and_Measurement_Terms",
"mediaType": "application/vnd.openxmlformats-officedocument.spreadsheetml.sheet",
"downloadURL": "https://data.nist.gov/od/ds/mds2-3430/DARE_Data_Public%2FFull_dataset%2FMeasurands_and_Measurement_Terms.xlsx"
},
{
"title": "DARE_Data_Public/Full_dataset/Tranche_A",
"mediaType": "application/zip",
"downloadURL": "https://data.nist.gov/od/ds/mds2-3430/DARE_Data_Public%2FFull_dataset%2FTranche_A.zip"
},
{
"title": "DARE_Data_Public/Full_dataset/Tranche_B",
"mediaType": "application/zip",
"downloadURL": "https://data.nist.gov/od/ds/mds2-3430/DARE_Data_Public%2FFull_dataset%2FTranche_B.zip"
},
{
"title": "DARE_Data_Public/Full_dataset/Tranche_C",
"mediaType": "application/zip",
"downloadURL": "https://data.nist.gov/od/ds/mds2-3430/DARE_Data_Public%2FFull_dataset%2FTranche_C.zip"
},
{
"title": "DARE_Data_Public/Full_dataset/variable_name_key",
"mediaType": "text/csv",
"downloadURL": "https://data.nist.gov/od/ds/mds2-3430/DARE_Data_Public%2FFull_dataset%2Fvariable_name_key.csv"
}
]
|
| identifier | ark:/88434/mds2-3430 |
| issued | 2025-02-05 |
| keyword |
[
"Anomalous state detection",
"cellular communication security",
"measurement stability",
"metrology",
"multi-feature detection",
"multi-layer architecture",
"radio access network."
]
|
| landingPage | https://data.nist.gov/od/id/mds2-3430 |
| language |
[
"en"
]
|
| license | https://www.nist.gov/open/license |
| modified | 2024-07-05 00:00:00 |
| programCode |
[
"006:045"
]
|
| publisher |
{
"name": "National Institute of Standards and Technology",
"@type": "org:Organization"
}
|
| references |
[
"https://doi.org/10.1016/j.jnca.2024.103979"
]
|
| theme |
[
"Advanced Communications:Wireless (RF)"
]
|
| title | Radio Access Network Anomalous State Detection Dataset |