padding-attack-dataset-panos-2023-12-13 (Q6038356)

From MaRDI portal
OpenML dataset with id 45921
Language Label Description Also known as
English
padding-attack-dataset-panos-2023-12-13
OpenML dataset with id 45921

    Statements

    0 references
    0 references
    Bleichenbacher Padding Attack: Dataset created on 2023-12-13 with server panos\N\NAttribute Names:\N\NCCS0:tcp.srcport\NCCS0:tcp.dstport\NCCS0:tcp.port\NCCS0:tcp.stream\NCCS0:tcp.len\NCCS0:tcp.seq\NCCS0:tcp.nxtseq\NCCS0:tcp.ack\NCCS0:tcp.hdr_len\NCCS0:tcp.flags.res\NCCS0:tcp.flags.ns\NCCS0:tcp.flags.cwr\NCCS0:tcp.flags.ecn\NCCS0:tcp.flags.urg\NCCS0:tcp.flags.ack\NCCS0:tcp.flags.push\NCCS0:tcp.flags.reset\NCCS0:tcp.flags.syn\NCCS0:tcp.flags.fin\NCCS0:tcp.window_size_value\NCCS0:tcp.window_size\NCCS0:tcp.window_size_scalefactor\NCCS0:tcp.checksum.status\NCCS0:tcp.urgent_pointer\NCCS0:tcp.options.nop\NCCS0:tcp.option_kind\NCCS0:tcp.option_len\NCCS0:tcp.options.timestamp.tsval\NCCS0:tcp.time_delta\NCCS0:order\NDISC0:tcp.srcport\NDISC0:tcp.dstport\NDISC0:tcp.port\NDISC0:tcp.stream\NDISC0:tcp.len\NDISC0:tcp.seq\NDISC0:tcp.nxtseq\NDISC0:tcp.ack\NDISC0:tcp.hdr_len\NDISC0:tcp.flags.res\NDISC0:tcp.flags.ns\NDISC0:tcp.flags.cwr\NDISC0:tcp.flags.ecn\NDISC0:tcp.flags.urg\NDISC0:tcp.flags.ack\NDISC0:tcp.flags.push\NDISC0:tcp.flags.reset\NDISC0:tcp.flags.syn\NDISC0:tcp.flags.fin\NDISC0:tcp.window_size_value\NDISC0:tcp.window_size\NDISC0:tcp.window_size_scalefactor\NDISC0:tcp.checksum.status\NDISC0:tcp.urgent_pointer\NDISC0:tcp.options.nop\NDISC0:tcp.option_kind\NDISC0:tcp.option_len\NDISC0:tcp.options.timestamp.tsval\NDISC0:tcp.time_delta\NDISC0:order\NDISC1:tcp.srcport\NDISC1:tcp.dstport\NDISC1:tcp.port\NDISC1:tcp.stream\NDISC1:tcp.len\NDISC1:tcp.seq\NDISC1:tcp.nxtseq\NDISC1:tcp.ack\NDISC1:tcp.hdr_len\NDISC1:tcp.flags.res\NDISC1:tcp.flags.ns\NDISC1:tcp.flags.cwr\NDISC1:tcp.flags.ecn\NDISC1:tcp.flags.urg\NDISC1:tcp.flags.ack\NDISC1:tcp.flags.push\NDISC1:tcp.flags.reset\NDISC1:tcp.flags.syn\NDISC1:tcp.flags.fin\NDISC1:tcp.window_size_value\NDISC1:tcp.window_size\NDISC1:tcp.window_size_scalefactor\NDISC1:tcp.checksum.status\NDISC1:tcp.urgent_pointer\NDISC1:tcp.options.nop\NDISC1:tcp.option_kind\NDISC1:tcp.option_len\NDISC1:tcp.options.timestamp.tsval\NDISC1:tcp.time_delta\NDISC1:order\NTLS0:tcp.srcport\NTLS0:tcp.dstport\NTLS0:tcp.port\NTLS0:tcp.stream\NTLS0:tcp.len\NTLS0:tcp.seq\NTLS0:tcp.nxtseq\NTLS0:tcp.ack\NTLS0:tcp.hdr_len\NTLS0:tcp.flags.res\NTLS0:tcp.flags.ns\NTLS0:tcp.flags.cwr\NTLS0:tcp.flags.ecn\NTLS0:tcp.flags.urg\NTLS0:tcp.flags.ack\NTLS0:tcp.flags.push\NTLS0:tcp.flags.reset\NTLS0:tcp.flags.syn\NTLS0:tcp.flags.fin\NTLS0:tcp.window_size_value\NTLS0:tcp.window_size\NTLS0:tcp.window_size_scalefactor\NTLS0:tcp.checksum.status\NTLS0:tcp.urgent_pointer\NTLS0:tcp.options.nop\NTLS0:tcp.option_kind\NTLS0:tcp.option_len\NTLS0:tcp.options.timestamp.tsval\NTLS0:tcp.time_delta\NTLS0:tls.record.content_type\NTLS0:tls.record.length\NTLS0:tls.alert_message.level\NTLS0:tls.alert_message.desc\NTLS0:order\NTLS1:tcp.srcport\NTLS1:tcp.dstport\NTLS1:tcp.port\NTLS1:tcp.stream\NTLS1:tcp.len\NTLS1:tcp.seq\NTLS1:tcp.nxtseq\NTLS1:tcp.ack\NTLS1:tcp.hdr_len\NTLS1:tcp.flags.res\NTLS1:tcp.flags.ns\NTLS1:tcp.flags.cwr\NTLS1:tcp.flags.ecn\NTLS1:tcp.flags.urg\NTLS1:tcp.flags.ack\NTLS1:tcp.flags.push\NTLS1:tcp.flags.reset\NTLS1:tcp.flags.syn\NTLS1:tcp.flags.fin\NTLS1:tcp.window_size_value\NTLS1:tcp.window_size\NTLS1:tcp.window_size_scalefactor\NTLS1:tcp.checksum.status\NTLS1:tcp.urgent_pointer\NTLS1:tcp.options.nop\NTLS1:tcp.option_kind\NTLS1:tcp.option_len\NTLS1:tcp.options.timestamp.tsval\NTLS1:tcp.time_delta\NTLS1:tls.record.content_type\NTLS1:tls.record.length\NTLS1:tls.alert_message.level\NTLS1:tls.alert_message.desc\NTLS1:order\NDISC0:tls.record.content_type\NDISC0:tls.record.length\NDISC0:tls.alert_message.level\NDISC0:tls.alert_message.desc\NDISC1:tls.record.content_type\NDISC1:tls.record.length\NDISC1:tls.alert_message.level\NDISC1:tls.alert_message.desc\NDISC2:tcp.srcport\NDISC2:tcp.dstport\NDISC2:tcp.port\NDISC2:tcp.stream\NDISC2:tcp.len\NDISC2:tcp.seq\NDISC2:tcp.nxtseq\NDISC2:tcp.ack\NDISC2:tcp.hdr_len\NDISC2:tcp.flags.res\NDISC2:tcp.flags.ns\NDISC2:tcp.flags.cwr\NDISC2:tcp.flags.ecn\NDISC2:tcp.flags.urg\NDISC2:tcp.flags.ack\NDISC2:tcp.flags.push\NDISC2:tcp.flags.reset\NDISC2:tcp.flags.syn\NDISC2:tcp.flags.fin\NDISC2:tcp.window_size_value\NDISC2:tcp.window_size\NDISC2:tcp.window_size_scalefactor\NDISC2:tcp.checksum.status\NDISC2:tcp.urgent_pointer\NDISC2:tcp.options.nop\NDISC2:tcp.option_kind\NDISC2:tcp.option_len\NDISC2:tcp.options.timestamp.tsval\NDISC2:tcp.time_delta\NDISC2:order\Nvulnerable_classes [0X00 In Pkcs#1 Padding (First 8 Bytes After 0X00 0X02), 0X00 In Some Padding Byte, Correctly Formatted Pkcs#1 Pms Message But 1 Byte Shorter, No 0X00 In Message, Wrong First Byte (0X00 Set To 0X17), Wrong Second Byte (0X02 Set To 0X17)]
    0 references
    Jan Peter Drees and Dennis Funke
    0 references
    0 references
    2023-12-13
    0 references
    27 February 2024
    0 references
    label
    0 references
    d84d98e3720c69620c8e15234dead7a3
    0 references
    0
    0 references
    11
    0 references
    197
    0 references
    7,869
    0 references
    612,770
    0 references
    196
    0 references
    0 references