padding-attack-dataset-OpenSSL097a-2023-04-28 (Q6038350)

From MaRDI portal
OpenML dataset with id 45915
Language Label Description Also known as
English
padding-attack-dataset-OpenSSL097a-2023-04-28
OpenML dataset with id 45915

    Statements

    0 references
    0 references
    Bleichenbacher Padding Attack: Dataset created on 2023-04-28 with server OpenSSL097a\N\NAttribute Names:\N\NTLS0:tcp.srcport\NTLS0:tcp.dstport\NTLS0:tcp.port\NTLS0:tcp.stream\NTLS0:tcp.len\NTLS0:tcp.seq\NTLS0:tcp.nxtseq\NTLS0:tcp.ack\NTLS0:tcp.hdr_len\NTLS0:tcp.flags.res\NTLS0:tcp.flags.ns\NTLS0:tcp.flags.cwr\NTLS0:tcp.flags.ecn\NTLS0:tcp.flags.urg\NTLS0:tcp.flags.ack\NTLS0:tcp.flags.push\NTLS0:tcp.flags.reset\NTLS0:tcp.flags.syn\NTLS0:tcp.flags.fin\NTLS0:tcp.window_size_value\NTLS0:tcp.window_size\NTLS0:tcp.window_size_scalefactor\NTLS0:tcp.checksum.status\NTLS0:tcp.urgent_pointer\NTLS0:tcp.options.nop\NTLS0:tcp.option_kind\NTLS0:tcp.option_len\NTLS0:tcp.options.timestamp.tsval\NTLS0:tcp.time_delta\NTLS0:tls.record.content_type\NTLS0:tls.record.length\NTLS0:tls.alert_message.level\NTLS0:tls.alert_message.desc\NTLS0:order\NDISC0:tcp.srcport\NDISC0:tcp.dstport\NDISC0:tcp.port\NDISC0:tcp.stream\NDISC0:tcp.len\NDISC0:tcp.seq\NDISC0:tcp.nxtseq\NDISC0:tcp.ack\NDISC0:tcp.hdr_len\NDISC0:tcp.flags.res\NDISC0:tcp.flags.ns\NDISC0:tcp.flags.cwr\NDISC0:tcp.flags.ecn\NDISC0:tcp.flags.urg\NDISC0:tcp.flags.ack\NDISC0:tcp.flags.push\NDISC0:tcp.flags.reset\NDISC0:tcp.flags.syn\NDISC0:tcp.flags.fin\NDISC0:tcp.window_size_value\NDISC0:tcp.window_size\NDISC0:tcp.window_size_scalefactor\NDISC0:tcp.checksum.status\NDISC0:tcp.urgent_pointer\NDISC0:tcp.options.nop\NDISC0:tcp.option_kind\NDISC0:tcp.option_len\NDISC0:tcp.options.timestamp.tsval\NDISC0:tcp.time_delta\NDISC0:order\NDISC1:tcp.srcport\NDISC1:tcp.dstport\NDISC1:tcp.port\NDISC1:tcp.stream\NDISC1:tcp.len\NDISC1:tcp.seq\NDISC1:tcp.nxtseq\NDISC1:tcp.ack\NDISC1:tcp.hdr_len\NDISC1:tcp.flags.res\NDISC1:tcp.flags.ns\NDISC1:tcp.flags.cwr\NDISC1:tcp.flags.ecn\NDISC1:tcp.flags.urg\NDISC1:tcp.flags.ack\NDISC1:tcp.flags.push\NDISC1:tcp.flags.reset\NDISC1:tcp.flags.syn\NDISC1:tcp.flags.fin\NDISC1:tcp.window_size_value\NDISC1:tcp.window_size\NDISC1:tcp.window_size_scalefactor\NDISC1:tcp.checksum.status\NDISC1:tcp.urgent_pointer\NDISC1:tcp.options.nop\NDISC1:tcp.option_kind\NDISC1:tcp.option_len\NDISC1:tcp.options.timestamp.tsval\NDISC1:tcp.time_delta\NDISC1:order\NCCS0:tcp.srcport\NCCS0:tcp.dstport\NCCS0:tcp.port\NCCS0:tcp.stream\NCCS0:tcp.len\NCCS0:tcp.seq\NCCS0:tcp.nxtseq\NCCS0:tcp.ack\NCCS0:tcp.hdr_len\NCCS0:tcp.flags.res\NCCS0:tcp.flags.ns\NCCS0:tcp.flags.cwr\NCCS0:tcp.flags.ecn\NCCS0:tcp.flags.urg\NCCS0:tcp.flags.ack\NCCS0:tcp.flags.push\NCCS0:tcp.flags.reset\NCCS0:tcp.flags.syn\NCCS0:tcp.flags.fin\NCCS0:tcp.window_size_value\NCCS0:tcp.window_size\NCCS0:tcp.window_size_scalefactor\NCCS0:tcp.checksum.status\NCCS0:tcp.urgent_pointer\NCCS0:tcp.options.nop\NCCS0:tcp.option_kind\NCCS0:tcp.option_len\NCCS0:tcp.options.timestamp.tsval\NCCS0:tcp.time_delta\NCCS0:order\Nvulnerable_classes [Invalid Tls Version In Pms]
    0 references
    Jan Peter Drees and Dennis Funke
    0 references
    0 references
    2023-04-28
    0 references
    27 February 2024
    0 references
    label
    0 references
    dba550c7cc9356ba52cd248e1ea84710
    0 references
    0
    0 references
    11
    0 references
    125
    0 references
    219,913
    0 references
    6,597,360
    0 references
    124
    0 references
    0 references