代码,示意了一个tls的数据内容:

import numpy as np
import matplotlib.pyplot as pyplot
# !!! If on the server, use following, comment show and you can just save figure !!!
# pyplot.switch_backend('agg') a = np.array([1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12])
b = np.reshape(a, (2, -1))
c = a.reshape(2, -1)
print(a)
print(c) tls_data = "9f008200430081004e00340066002e002400230030003e002f0031001e0022002b001e0027002f0022001e002b0030002700240011002800190032001a00230037001c00180021001b001f001d001c0025001c0026002b0017001e007c002d008b003e002e00170018001f001d0024001f0021001d001f001900160013001a001c0027001b002c001e0023001800280020001b00280012001d001c001f001f00190019002b001e001b00370017001b002000230027001d001a001f00220016001c0032002200560043005000190035002300520026002b003d00380032003f003300210034003300400053001b003e0018001c00160017001e0019001c0017001b00210049002300170021002b001a00100024001b00220013001f001c001a001f001f0022000f0012001f001c001d001900210019001e00240020002100190025002000160020002c001d00180017002100210018001a00200014001e001900170026001b00170022001500250016001d002100200020001b001e001a001b002a00200020001d00230022001f00170017001b0017001d0015001f001a001900180022001a00170017001c001900180021001b001a0018002a001e001d001d00280022001f00180023001e001f001b0018001f001c0023002a00230016001d001a001f00180017001d001c00170026001c002200190019001c001f0018002600"
# tls_data = tls_data[:512]
print(len(tls_data))
tls_data = [ord(c) for c in tls_data]
#np.reshape(tls_data[:32*32], (32, 32)) tls_data = np.array(tls_data)
# padding with 0
tls_data.resize(32*32)
c = tls_data.reshape(32, 32) # print(c)
# pyplot.imshow(c, cmap="gray")
pyplot.imshow(c)
pyplot.gray()
pyplot.show()
# pyplot.savefig("xxx.jpg") # not work
pyplot.imsave('test.png', c) """
data = "6^f7905bd00a47187f00000000^46.229.168.130^115.27.245.2^62560^443^6^2732^30^21312^24^1540360775^1540360778^^^^^^^^^^^^^SSL^HTTPS^Network^Infrastructure^^^^0:24;203:2;126:2;249:2-0:6;1448:12;798:2;274:2;264:2^+0eb-5c8-5c8-33e+09e-132+119-5c8-5c8-5c8-128^5223def45223def75223def75223def75223e59d5223e59e5223e6f05223e6f35223e6f35223e6f35223e6f3^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^^^^^^^^^^^"
arr = data.split("^")
print(arr[-12])
"""

感觉还是有内在规律可以遵循的。

tls 流量画像——直接使用图像处理的思路探索,待进一步观察的更多相关文章

  1. 如何利用Wireshark解密SSL和TLS流量

    如何利用Wireshark解密SSL和TLS流量https://support.citrix.com/article/CTX135121 1.有server端的private key,直接在wires ...

  2. HTTPS=HTTP + SSL / TLS

    以下的两个链接作为本次编辑的参考 https://www.bennythink.com/school-1.htmlhttps://www.bennythink.com/school-2.html 应一 ...

  3. 思科恶意加密TLS流检测论文记录——由于样本不均衡,其实做得并不好,神马99.9的准确率都是浮云啊,之所以思科使用DNS和http一个重要假设是DGA和HTTP C&C(正常http会有图片等)。一开始思科使用的逻辑回归,后面17年文章是随机森林。

    论文记录:Identifying Encrypted Malware Traffic with Contextual Flow Data from:https://songcoming.github. ...

  4. 使用机器学习检测TLS 恶意加密流——业界调研***有开源的数据集,包括恶意证书的,以及恶意tls pcap报文***

    2018 年的文章, Using deep neural networks to hunt malicious TLS certificates from:https://techxplore.com ...

  5. idou老师教你学Istio 17 : 通过HTTPS进行双向TLS传输

    众所周知,HTTPS是用来解决 HTTP 明文协议的缺陷,在 HTTP 的基础上加入 SSL/TLS 协议,依靠 SSL 证书来验证服务器的身份,为客户端和服务器端之间建立“SSL”通道,确保数据运输 ...

  6. EXCHANGE 2013 TLS传输层安全

    默认情况下,SMTP流量是不被加密的,这就导致在公网上进行邮件沟通就像是在广播一样,任何人拦截到该邮件都可以轻而易举的读取其内容.但是现实场景中有许多敏感信息是通过邮件来进行发送的,所以其中一种保护邮 ...

  7. Hadoop案例(九)流量汇总案例

    流量汇总程序案例 1.自定义输出 统计手机号耗费的总上行流量.下行流量.总流量(序列化) 1)需求: 统计每一个手机号耗费的总上行流量.下行流量.总流量 2)数据准备 phone_date.txt - ...

  8. 网络流量分析——NPMD关注IT运维、识别宕机和运行不佳进行性能优化。智能化分析是关键-主动发现业务运行异常。科来做APT相关的安全分析

    科来 做流量分析,同时也做了一些安全分析(偏APT)——参考其官网:http://www.colasoft.com.cn/cases-and-application/network-security- ...

  9. android黑科技系列——应用市场省流量更新(增量升级)原理解析

    一.前言 最近在看热修复相关的框架,之前我们已经看过了阿里的Dexposed和AndFix这两个框架了,不了解的同学可以点击这里进行查看:Dexposed框架原理解析 和 AndFix热修复框架原理解 ...

随机推荐

  1. 将实体类、匿名对象转换为SqlParameter列表

    /// <summary> /// <remarks> /// <para>将实体类/匿名对象转换为SqlParameter列表</para> /// ...

  2. RN 使用第三方组件之react-native-image-picker(拍照/从相册获取图片)

    首先给个github地址:https://github.com/react-community/react-native-image-picker  英文不行的看下面这个笔记 该插件可以同时给iOS和 ...

  3. hdu 5120 Intersection 两个圆的面积交

    Intersection Time Limit: 4000/4000 MS (Java/Others)    Memory Limit: 512000/512000 K (Java/Others) P ...

  4. linux中日历命令显示

    cal 显示当前月的日历 cal 年份 显示特定一年的年历 [jasmine.qian@]$ cal January 2019 Su Mo Tu We Th Fr Sa 1 2 3 4 5 6 7 8 ...

  5. django信号 signal

    django自带一套信号机制来帮助我们在框架的不同位置之间传递信息.也就是说,当某一事件发生时,信号系统可以允许一个或多个发送者(senders)将通知或信号(signals)发送给一组接受者(rec ...

  6. System.out.println 报错: 只能运行在方法体内哦, 类里面只包含属性和方法哦,注意!

    类里面包含属性和方法 所以, System.out.println,只能放在方法体内运行,不能放在类里.方法外哦

  7. leecode第七十题(爬楼梯)

    class Solution { public: int climbStairs(int n) { vector<unsigned long long> num;//斐波那契数列 num. ...

  8. 虹软人脸识别SDK的接入方法

    背景: 虹软的人脸识别还是不错的,在官方注册一个账号,成为开发者,下载SDK的jar包,在开发者中心,找一个demo就可以开始做了,安装里边的逻辑,先看理解代码,然后就可以控制代码,完成自己想要的功能 ...

  9. CentOS/redhat使用光盘镜像源

    1,首先进行光盘的挂载,注意光盘挂载时不会自动建立目录的,    所以需要自己建立目录.    mkdir /mnt/cdrom    mount /dev/cdrom /mnt/cdrom  #de ...

  10. LeetCode--496--下一个更大元素I(java)

    给定两个没有重复元素的数组 nums1和 nums2 ,其中nums1 是 nums2 的子集.找到 nums1 中每个元素在 nums2 中的下一个比其大的值. nums1 中数字 x 的下一个更大 ...