Cape Peninsula University of Technology
Browse
DATASET
Pods Network Usage-data-2024-07-03 02_00_55.csv (2.39 kB)
DATASET
google scholar - nbio+security+ddos+edge -200.csv (171.84 kB)
DATASET
google scholar -nbiot+security+ddos-200.csv (163.28 kB)
DATASET
googlescholar-nbiot+security-200.csv (152.42 kB)
DATASET
CSQ tests and results.xlsx (25.73 kB)
DATASET
Correlation between CPU and RAM usage analysis.xlsx (10.67 kB)
DOCUMENT
prometheus metrics of bandwidth traffic data.txt.rtf (30.73 kB)
DOCUMENT
folio rate limiting metrics.txt.rtf (7.79 kB)
DOCUMENT
folio rate limiting metrics test1.txt.rtf (6.35 kB)
DOCUMENT
folio rate limiting metrics iteration2.txt.rtf (18.72 kB)
DOCUMENT
ratelimting applied cilium.txt.rtf (12.17 kB)
DOCUMENT
folio 3000 connections to nginx.txt.rtf (3.83 kB)
1/0
12 files

A delay-tolerant network architecture for edge computing with applications in narrow band internet of things

dataset
posted on 2024-11-08, 09:42 authored by Waldon HendricksWaldon Hendricks

Ethical ref# 204520231/2023/3

The research involved designing and testing a narrow-band IoT Delay-Tolerant Network (NB-IoTDTN) to enhance resilience against Distributed Denial-of-Service (DDoS) attacks. The data consisted of simulated network traffic and performance metrics collected from a testbed environment, which was built using Raspberry Pi nodes connected in a K3s edge cluster. The nodes were configured to run containerized environments using Cilium CNI for secure and observable networking.

  • Type of Data: The collected data included network performance metrics such as latency, jitter, packet loss, throughput, and system logs detailing DDoS attack attempts and mitigations. This data was captured using monitoring tools like Grafana and Prometheus.
  • Data Collection: Network traffic, including normal and DDoS-attack scenarios, was simulated using UERANSIM and Open5GS to replicate the interaction between NB-IoT devices and the core network. Data was collected continuously during these simulations to monitor the network's ability to maintain performance under attack conditions.
  • Usage of Data: The data was used to evaluate the effectiveness of the NB-IoTDTN architecture in mitigating the impact of DDoS attacks. Key metrics such as system uptime, data packet delivery rates, and service continuity under attack conditions were analyzed.
  • Outcome: The findings from this data indicated that the NB-IoTDTN architecture significantly improved the network's resilience by maintaining service continuity during DDoS scenarios. The lightweight security protocols designed for resource-constrained devices showed effectiveness with minimal computational overhead. The data demonstrated improved performance in maintaining network functionality even under high-traffic conditions caused by DDoS attacks.

History

Is this dataset for graduation purposes?

  • Yes

Supervisor email address

kabasob@cput.ac.za

Usage metrics

    Faculty of Informatics and Design

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC