padding-attack-dataset-OpenSSL-1.1.1k-2021-07-23

From MaRDI portal
Dataset:6038348



OpenML45913MaRDI QIDQ6038348

OpenML dataset with id 45913

No author found.

Full work available at URL: https://api.openml.org/data/v1/download/22117536/padding-attack-dataset-OpenSSL-1.1.1k-2021-07-23.arff

Upload date: 27 February 2024


Dataset Characteristics

Number of classes: 11
Number of features: 117 (numeric: 116, symbolic: 0 and in total binary: 0 )
Number of instances: 49,977
Number of instances with missing values: 49,977
Number of missing values: 2,196,060

Bleichenbacher Padding Attack: Dataset created on 2021-07-23 with server OpenSSL-1.1.1k

Attribute Names:

TLS0:tcp.srcport TLS0:tcp.dstport TLS0:tcp.port TLS0:tcp.stream TLS0:tcp.len TLS0:tcp.seq TLS0:tcp.nxtseq TLS0:tcp.ack TLS0:tcp.hdr_len TLS0:tcp.flags.res TLS0:tcp.flags.ns TLS0:tcp.flags.cwr TLS0:tcp.flags.ecn TLS0:tcp.flags.urg TLS0:tcp.flags.ack TLS0:tcp.flags.push TLS0:tcp.flags.reset TLS0:tcp.flags.syn TLS0:tcp.flags.fin TLS0:tcp.window_size_value TLS0:tcp.window_size TLS0:tcp.window_size_scalefactor TLS0:tcp.checksum.status TLS0:tcp.urgent_pointer TLS0:tcp.options.nop TLS0:tcp.option_kind TLS0:tcp.option_len TLS0:ssl.record.content_type TLS0:ssl.record.length TLS0:ssl.alert_message.level TLS0:ssl.alert_message.desc TLS0:order DISC0:tcp.srcport DISC0:tcp.dstport DISC0:tcp.port DISC0:tcp.stream DISC0:tcp.len DISC0:tcp.seq DISC0:tcp.nxtseq DISC0:tcp.ack DISC0:tcp.hdr_len DISC0:tcp.flags.res DISC0:tcp.flags.ns DISC0:tcp.flags.cwr DISC0:tcp.flags.ecn DISC0:tcp.flags.urg DISC0:tcp.flags.ack DISC0:tcp.flags.push DISC0:tcp.flags.reset DISC0:tcp.flags.syn DISC0:tcp.flags.fin DISC0:tcp.window_size_value DISC0:tcp.window_size DISC0:tcp.window_size_scalefactor DISC0:tcp.checksum.status DISC0:tcp.urgent_pointer DISC0:tcp.options.nop DISC0:tcp.option_kind DISC0:tcp.option_len DISC0:order DISC1:tcp.srcport DISC1:tcp.dstport DISC1:tcp.port DISC1:tcp.stream DISC1:tcp.len DISC1:tcp.seq DISC1:tcp.nxtseq DISC1:tcp.ack DISC1:tcp.hdr_len DISC1:tcp.flags.res DISC1:tcp.flags.ns DISC1:tcp.flags.cwr DISC1:tcp.flags.ecn DISC1:tcp.flags.urg DISC1:tcp.flags.ack DISC1:tcp.flags.push DISC1:tcp.flags.reset DISC1:tcp.flags.syn DISC1:tcp.flags.fin DISC1:tcp.window_size_value DISC1:tcp.window_size DISC1:tcp.window_size_scalefactor DISC1:tcp.checksum.status DISC1:tcp.urgent_pointer DISC1:tcp.options.nop DISC1:tcp.option_kind DISC1:tcp.option_len DISC1:order CKE0:tcp.srcport CKE0:tcp.dstport CKE0:tcp.port CKE0:tcp.stream CKE0:tcp.len CKE0:tcp.seq CKE0:tcp.nxtseq CKE0:tcp.ack CKE0:tcp.hdr_len CKE0:tcp.flags.res CKE0:tcp.flags.ns CKE0:tcp.flags.cwr CKE0:tcp.flags.ecn CKE0:tcp.flags.urg CKE0:tcp.flags.ack CKE0:tcp.flags.push CKE0:tcp.flags.reset CKE0:tcp.flags.syn CKE0:tcp.flags.fin CKE0:tcp.window_size_value CKE0:tcp.window_size CKE0:tcp.window_size_scalefactor CKE0:tcp.checksum.status CKE0:tcp.urgent_pointer CKE0:tcp.options.nop CKE0:tcp.option_kind CKE0:tcp.option_len CKE0:order vulnerable_classes []