padding-attack-dataset-panos-2023-12-13

From MaRDI portal
Dataset:6038356



OpenML45921MaRDI QIDQ6038356

OpenML dataset with id 45921

No author found.

Full work available at URL: https://api.openml.org/data/v1/download/22117544/padding-attack-dataset-panos-2023-12-13.arff

Upload date: 27 February 2024


Dataset Characteristics

Number of classes: 11
Number of features: 197 (numeric: 196, symbolic: 0 and in total binary: 0 )
Number of instances: 7,869
Number of instances with missing values: 7,869
Number of missing values: 612,770

Bleichenbacher Padding Attack: Dataset created on 2023-12-13 with server panos

Attribute Names:

CCS0:tcp.srcport CCS0:tcp.dstport CCS0:tcp.port CCS0:tcp.stream CCS0:tcp.len CCS0:tcp.seq CCS0:tcp.nxtseq CCS0:tcp.ack CCS0:tcp.hdr_len CCS0:tcp.flags.res CCS0:tcp.flags.ns CCS0:tcp.flags.cwr CCS0:tcp.flags.ecn CCS0:tcp.flags.urg CCS0:tcp.flags.ack CCS0:tcp.flags.push CCS0:tcp.flags.reset CCS0:tcp.flags.syn CCS0:tcp.flags.fin CCS0:tcp.window_size_value CCS0:tcp.window_size CCS0:tcp.window_size_scalefactor CCS0:tcp.checksum.status CCS0:tcp.urgent_pointer CCS0:tcp.options.nop CCS0:tcp.option_kind CCS0:tcp.option_len CCS0:tcp.options.timestamp.tsval CCS0:tcp.time_delta CCS0:order DISC0:tcp.srcport DISC0:tcp.dstport DISC0:tcp.port DISC0:tcp.stream DISC0:tcp.len DISC0:tcp.seq DISC0:tcp.nxtseq DISC0:tcp.ack DISC0:tcp.hdr_len DISC0:tcp.flags.res DISC0:tcp.flags.ns DISC0:tcp.flags.cwr DISC0:tcp.flags.ecn DISC0:tcp.flags.urg DISC0:tcp.flags.ack DISC0:tcp.flags.push DISC0:tcp.flags.reset DISC0:tcp.flags.syn DISC0:tcp.flags.fin DISC0:tcp.window_size_value DISC0:tcp.window_size DISC0:tcp.window_size_scalefactor DISC0:tcp.checksum.status DISC0:tcp.urgent_pointer DISC0:tcp.options.nop DISC0:tcp.option_kind DISC0:tcp.option_len DISC0:tcp.options.timestamp.tsval DISC0:tcp.time_delta DISC0:order DISC1:tcp.srcport DISC1:tcp.dstport DISC1:tcp.port DISC1:tcp.stream DISC1:tcp.len DISC1:tcp.seq DISC1:tcp.nxtseq DISC1:tcp.ack DISC1:tcp.hdr_len DISC1:tcp.flags.res DISC1:tcp.flags.ns DISC1:tcp.flags.cwr DISC1:tcp.flags.ecn DISC1:tcp.flags.urg DISC1:tcp.flags.ack DISC1:tcp.flags.push DISC1:tcp.flags.reset DISC1:tcp.flags.syn DISC1:tcp.flags.fin DISC1:tcp.window_size_value DISC1:tcp.window_size DISC1:tcp.window_size_scalefactor DISC1:tcp.checksum.status DISC1:tcp.urgent_pointer DISC1:tcp.options.nop DISC1:tcp.option_kind DISC1:tcp.option_len DISC1:tcp.options.timestamp.tsval DISC1:tcp.time_delta DISC1:order TLS0:tcp.srcport TLS0:tcp.dstport TLS0:tcp.port TLS0:tcp.stream TLS0:tcp.len TLS0:tcp.seq TLS0:tcp.nxtseq TLS0:tcp.ack TLS0:tcp.hdr_len TLS0:tcp.flags.res TLS0:tcp.flags.ns TLS0:tcp.flags.cwr TLS0:tcp.flags.ecn TLS0:tcp.flags.urg TLS0:tcp.flags.ack TLS0:tcp.flags.push TLS0:tcp.flags.reset TLS0:tcp.flags.syn TLS0:tcp.flags.fin TLS0:tcp.window_size_value TLS0:tcp.window_size TLS0:tcp.window_size_scalefactor TLS0:tcp.checksum.status TLS0:tcp.urgent_pointer TLS0:tcp.options.nop TLS0:tcp.option_kind TLS0:tcp.option_len TLS0:tcp.options.timestamp.tsval TLS0:tcp.time_delta TLS0:tls.record.content_type TLS0:tls.record.length TLS0:tls.alert_message.level TLS0:tls.alert_message.desc TLS0:order TLS1:tcp.srcport TLS1:tcp.dstport TLS1:tcp.port TLS1:tcp.stream TLS1:tcp.len TLS1:tcp.seq TLS1:tcp.nxtseq TLS1:tcp.ack TLS1:tcp.hdr_len TLS1:tcp.flags.res TLS1:tcp.flags.ns TLS1:tcp.flags.cwr TLS1:tcp.flags.ecn TLS1:tcp.flags.urg TLS1:tcp.flags.ack TLS1:tcp.flags.push TLS1:tcp.flags.reset TLS1:tcp.flags.syn TLS1:tcp.flags.fin TLS1:tcp.window_size_value TLS1:tcp.window_size TLS1:tcp.window_size_scalefactor TLS1:tcp.checksum.status TLS1:tcp.urgent_pointer TLS1:tcp.options.nop TLS1:tcp.option_kind TLS1:tcp.option_len TLS1:tcp.options.timestamp.tsval TLS1:tcp.time_delta TLS1:tls.record.content_type TLS1:tls.record.length TLS1:tls.alert_message.level TLS1:tls.alert_message.desc TLS1:order DISC0:tls.record.content_type DISC0:tls.record.length DISC0:tls.alert_message.level DISC0:tls.alert_message.desc DISC1:tls.record.content_type DISC1:tls.record.length DISC1:tls.alert_message.level DISC1:tls.alert_message.desc DISC2:tcp.srcport DISC2:tcp.dstport DISC2:tcp.port DISC2:tcp.stream DISC2:tcp.len DISC2:tcp.seq DISC2:tcp.nxtseq DISC2:tcp.ack DISC2:tcp.hdr_len DISC2:tcp.flags.res DISC2:tcp.flags.ns DISC2:tcp.flags.cwr DISC2:tcp.flags.ecn DISC2:tcp.flags.urg DISC2:tcp.flags.ack DISC2:tcp.flags.push DISC2:tcp.flags.reset DISC2:tcp.flags.syn DISC2:tcp.flags.fin DISC2:tcp.window_size_value DISC2:tcp.window_size DISC2:tcp.window_size_scalefactor DISC2:tcp.checksum.status DISC2:tcp.urgent_pointer DISC2:tcp.options.nop DISC2:tcp.option_kind DISC2:tcp.option_len DISC2:tcp.options.timestamp.tsval DISC2:tcp.time_delta DISC2:order vulnerable_classes [0X00 In Pkcs#1 Padding (First 8 Bytes After 0X00 0X02), 0X00 In Some Padding Byte, Correctly Formatted Pkcs#1 Pms Message But 1 Byte Shorter, No 0X00 In Message, Wrong First Byte (0X00 Set To 0X17), Wrong Second Byte (0X02 Set To 0X17)]