padding-attack-dataset-panos-2023-12-13
OpenML dataset with id 45921
No author found.
Full work available at URL: https://api.openml.org/data/v1/download/22117544/padding-attack-dataset-panos-2023-12-13.arff
Upload date: 27 February 2024
Dataset Characteristics
Number of classes: 11
Number of features: 197 (numeric: 196, symbolic: 0 and in total binary: 0 )
Number of instances: 7,869
Number of instances with missing values: 7,869
Number of missing values: 612,770
Bleichenbacher Padding Attack: Dataset created on 2023-12-13 with server panos
Attribute Names:
CCS0:tcp.srcport
CCS0:tcp.dstport
CCS0:tcp.port
CCS0:tcp.stream
CCS0:tcp.len
CCS0:tcp.seq
CCS0:tcp.nxtseq
CCS0:tcp.ack
CCS0:tcp.hdr_len
CCS0:tcp.flags.res
CCS0:tcp.flags.ns
CCS0:tcp.flags.cwr
CCS0:tcp.flags.ecn
CCS0:tcp.flags.urg
CCS0:tcp.flags.ack
CCS0:tcp.flags.push
CCS0:tcp.flags.reset
CCS0:tcp.flags.syn
CCS0:tcp.flags.fin
CCS0:tcp.window_size_value
CCS0:tcp.window_size
CCS0:tcp.window_size_scalefactor
CCS0:tcp.checksum.status
CCS0:tcp.urgent_pointer
CCS0:tcp.options.nop
CCS0:tcp.option_kind
CCS0:tcp.option_len
CCS0:tcp.options.timestamp.tsval
CCS0:tcp.time_delta
CCS0:order
DISC0:tcp.srcport
DISC0:tcp.dstport
DISC0:tcp.port
DISC0:tcp.stream
DISC0:tcp.len
DISC0:tcp.seq
DISC0:tcp.nxtseq
DISC0:tcp.ack
DISC0:tcp.hdr_len
DISC0:tcp.flags.res
DISC0:tcp.flags.ns
DISC0:tcp.flags.cwr
DISC0:tcp.flags.ecn
DISC0:tcp.flags.urg
DISC0:tcp.flags.ack
DISC0:tcp.flags.push
DISC0:tcp.flags.reset
DISC0:tcp.flags.syn
DISC0:tcp.flags.fin
DISC0:tcp.window_size_value
DISC0:tcp.window_size
DISC0:tcp.window_size_scalefactor
DISC0:tcp.checksum.status
DISC0:tcp.urgent_pointer
DISC0:tcp.options.nop
DISC0:tcp.option_kind
DISC0:tcp.option_len
DISC0:tcp.options.timestamp.tsval
DISC0:tcp.time_delta
DISC0:order
DISC1:tcp.srcport
DISC1:tcp.dstport
DISC1:tcp.port
DISC1:tcp.stream
DISC1:tcp.len
DISC1:tcp.seq
DISC1:tcp.nxtseq
DISC1:tcp.ack
DISC1:tcp.hdr_len
DISC1:tcp.flags.res
DISC1:tcp.flags.ns
DISC1:tcp.flags.cwr
DISC1:tcp.flags.ecn
DISC1:tcp.flags.urg
DISC1:tcp.flags.ack
DISC1:tcp.flags.push
DISC1:tcp.flags.reset
DISC1:tcp.flags.syn
DISC1:tcp.flags.fin
DISC1:tcp.window_size_value
DISC1:tcp.window_size
DISC1:tcp.window_size_scalefactor
DISC1:tcp.checksum.status
DISC1:tcp.urgent_pointer
DISC1:tcp.options.nop
DISC1:tcp.option_kind
DISC1:tcp.option_len
DISC1:tcp.options.timestamp.tsval
DISC1:tcp.time_delta
DISC1:order
TLS0:tcp.srcport
TLS0:tcp.dstport
TLS0:tcp.port
TLS0:tcp.stream
TLS0:tcp.len
TLS0:tcp.seq
TLS0:tcp.nxtseq
TLS0:tcp.ack
TLS0:tcp.hdr_len
TLS0:tcp.flags.res
TLS0:tcp.flags.ns
TLS0:tcp.flags.cwr
TLS0:tcp.flags.ecn
TLS0:tcp.flags.urg
TLS0:tcp.flags.ack
TLS0:tcp.flags.push
TLS0:tcp.flags.reset
TLS0:tcp.flags.syn
TLS0:tcp.flags.fin
TLS0:tcp.window_size_value
TLS0:tcp.window_size
TLS0:tcp.window_size_scalefactor
TLS0:tcp.checksum.status
TLS0:tcp.urgent_pointer
TLS0:tcp.options.nop
TLS0:tcp.option_kind
TLS0:tcp.option_len
TLS0:tcp.options.timestamp.tsval
TLS0:tcp.time_delta
TLS0:tls.record.content_type
TLS0:tls.record.length
TLS0:tls.alert_message.level
TLS0:tls.alert_message.desc
TLS0:order
TLS1:tcp.srcport
TLS1:tcp.dstport
TLS1:tcp.port
TLS1:tcp.stream
TLS1:tcp.len
TLS1:tcp.seq
TLS1:tcp.nxtseq
TLS1:tcp.ack
TLS1:tcp.hdr_len
TLS1:tcp.flags.res
TLS1:tcp.flags.ns
TLS1:tcp.flags.cwr
TLS1:tcp.flags.ecn
TLS1:tcp.flags.urg
TLS1:tcp.flags.ack
TLS1:tcp.flags.push
TLS1:tcp.flags.reset
TLS1:tcp.flags.syn
TLS1:tcp.flags.fin
TLS1:tcp.window_size_value
TLS1:tcp.window_size
TLS1:tcp.window_size_scalefactor
TLS1:tcp.checksum.status
TLS1:tcp.urgent_pointer
TLS1:tcp.options.nop
TLS1:tcp.option_kind
TLS1:tcp.option_len
TLS1:tcp.options.timestamp.tsval
TLS1:tcp.time_delta
TLS1:tls.record.content_type
TLS1:tls.record.length
TLS1:tls.alert_message.level
TLS1:tls.alert_message.desc
TLS1:order
DISC0:tls.record.content_type
DISC0:tls.record.length
DISC0:tls.alert_message.level
DISC0:tls.alert_message.desc
DISC1:tls.record.content_type
DISC1:tls.record.length
DISC1:tls.alert_message.level
DISC1:tls.alert_message.desc
DISC2:tcp.srcport
DISC2:tcp.dstport
DISC2:tcp.port
DISC2:tcp.stream
DISC2:tcp.len
DISC2:tcp.seq
DISC2:tcp.nxtseq
DISC2:tcp.ack
DISC2:tcp.hdr_len
DISC2:tcp.flags.res
DISC2:tcp.flags.ns
DISC2:tcp.flags.cwr
DISC2:tcp.flags.ecn
DISC2:tcp.flags.urg
DISC2:tcp.flags.ack
DISC2:tcp.flags.push
DISC2:tcp.flags.reset
DISC2:tcp.flags.syn
DISC2:tcp.flags.fin
DISC2:tcp.window_size_value
DISC2:tcp.window_size
DISC2:tcp.window_size_scalefactor
DISC2:tcp.checksum.status
DISC2:tcp.urgent_pointer
DISC2:tcp.options.nop
DISC2:tcp.option_kind
DISC2:tcp.option_len
DISC2:tcp.options.timestamp.tsval
DISC2:tcp.time_delta
DISC2:order
vulnerable_classes [0X00 In Pkcs#1 Padding (First 8 Bytes After 0X00 0X02), 0X00 In Some Padding Byte, Correctly Formatted Pkcs#1 Pms Message But 1 Byte Shorter, No 0X00 In Message, Wrong First Byte (0X00 Set To 0X17), Wrong Second Byte (0X02 Set To 0X17)]