代码,示意了一个tls的数据内容:

import numpy as np
import matplotlib.pyplot as pyplot
# !!! If on the server, use following, comment show and you can just save figure !!!
# pyplot.switch_backend('agg') a = np.array([1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12])
b = np.reshape(a, (2, -1))
c = a.reshape(2, -1)
print(a)
print(c) tls_data = "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"
# tls_data = tls_data[:512]
print(len(tls_data))
tls_data = [ord(c) for c in tls_data]
#np.reshape(tls_data[:32*32], (32, 32)) tls_data = np.array(tls_data)
# padding with 0
tls_data.resize(32*32)
c = tls_data.reshape(32, 32) # print(c)
# pyplot.imshow(c, cmap="gray")
pyplot.imshow(c)
pyplot.gray()
pyplot.show()
# pyplot.savefig("xxx.jpg") # not work
pyplot.imsave('test.png', c) """
data = "6^f7905bd00a47187f00000000^46.229.168.130^115.27.245.2^62560^443^6^2732^30^21312^24^1540360775^1540360778^^^^^^^^^^^^^SSL^HTTPS^Network^Infrastructure^^^^0:24;203:2;126:2;249:2-0:6;1448:12;798:2;274:2;264:2^+0eb-5c8-5c8-33e+09e-132+119-5c8-5c8-5c8-128^5223def45223def75223def75223def75223e59d5223e59e5223e6f05223e6f35223e6f35223e6f35223e6f3^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^^^^^^^^^^^"
arr = data.split("^")
print(arr[-12])
"""

感觉还是有内在规律可以遵循的。

tls 流量画像——直接使用图像处理的思路探索,待进一步观察的更多相关文章

  1. 如何利用Wireshark解密SSL和TLS流量

    如何利用Wireshark解密SSL和TLS流量https://support.citrix.com/article/CTX135121 1.有server端的private key,直接在wires ...

  2. HTTPS=HTTP + SSL / TLS

    以下的两个链接作为本次编辑的参考 https://www.bennythink.com/school-1.htmlhttps://www.bennythink.com/school-2.html 应一 ...

  3. 思科恶意加密TLS流检测论文记录——由于样本不均衡,其实做得并不好,神马99.9的准确率都是浮云啊,之所以思科使用DNS和http一个重要假设是DGA和HTTP C&C(正常http会有图片等)。一开始思科使用的逻辑回归,后面17年文章是随机森林。

    论文记录:Identifying Encrypted Malware Traffic with Contextual Flow Data from:https://songcoming.github. ...

  4. 使用机器学习检测TLS 恶意加密流——业界调研***有开源的数据集,包括恶意证书的,以及恶意tls pcap报文***

    2018 年的文章, Using deep neural networks to hunt malicious TLS certificates from:https://techxplore.com ...

  5. idou老师教你学Istio 17 : 通过HTTPS进行双向TLS传输

    众所周知,HTTPS是用来解决 HTTP 明文协议的缺陷,在 HTTP 的基础上加入 SSL/TLS 协议,依靠 SSL 证书来验证服务器的身份,为客户端和服务器端之间建立“SSL”通道,确保数据运输 ...

  6. EXCHANGE 2013 TLS传输层安全

    默认情况下,SMTP流量是不被加密的,这就导致在公网上进行邮件沟通就像是在广播一样,任何人拦截到该邮件都可以轻而易举的读取其内容.但是现实场景中有许多敏感信息是通过邮件来进行发送的,所以其中一种保护邮 ...

  7. Hadoop案例(九)流量汇总案例

    流量汇总程序案例 1.自定义输出 统计手机号耗费的总上行流量.下行流量.总流量(序列化) 1)需求: 统计每一个手机号耗费的总上行流量.下行流量.总流量 2)数据准备 phone_date.txt - ...

  8. 网络流量分析——NPMD关注IT运维、识别宕机和运行不佳进行性能优化。智能化分析是关键-主动发现业务运行异常。科来做APT相关的安全分析

    科来 做流量分析,同时也做了一些安全分析(偏APT)——参考其官网:http://www.colasoft.com.cn/cases-and-application/network-security- ...

  9. android黑科技系列——应用市场省流量更新(增量升级)原理解析

    一.前言 最近在看热修复相关的框架,之前我们已经看过了阿里的Dexposed和AndFix这两个框架了,不了解的同学可以点击这里进行查看:Dexposed框架原理解析 和 AndFix热修复框架原理解 ...

随机推荐

  1. Mysql 强行Kill 连接

    BEGIN ; ; ; DO KILL @Temp; ; END WHILE ; END

  2. [转][JSBSim]JSBSim的使用--飞行控制组件及其配置

    http://www.jianshu.com/p/b5e9f1f5df95 飞行控制率.稳定增强系统.自动驾驶仪和其他飞控系统(航电.电气等)都能够在 JSBSim 中以独立的控制组件进行建模.JSB ...

  3. 微信小程序动态更改样式

    获取列表长度(动态渲染),当长度>x时添加内联样式并绑定数据{{}},通过js动态更改{{}}

  4. java调用dll/so文件

    大家都知道用C++编写的程序如果用于windows使用则编译为xxx.dll文件,如果是Linux使用则编译为libxxx.so文件.下面将java调用dll/so文件的方法粘出来方便下次使用.此处使 ...

  5. 如何模拟一个http请求并把response的内容保存下载下来,导出到excel中(结尾福利)

    def doExport(self): # 模拟一个http请求 url = u'%s?dumptype=investigation&dumpid=%s&timezone=8' % ( ...

  6. php如何控制客户端生成缓存

    php如何控制客户端生成缓存 一.总结 一句话总结:用http消息响应头中的Cache-Control来控制客户端缓存,说的是页面本身被客户端缓存,而不是重新生成的其它的非页面缓存 响应头Cache- ...

  7. English trip V1 - 22. My Life Teacher:Emily Key: describe talk about past 过去式

    In this lesson you will learn to talk about the past. 课上内容(Lesson) I was born in 1986. I started sch ...

  8. MyEclipse配置Tomcat服务器(最简单的配置过程)

    MyEclipse配置Tomcat服务器比较简单,在这里直接给出简要的配置步骤了,相信大家都能很容易明白…… 1.Window->Preferences 2.根据你的Tomcat版本找到对应的T ...

  9. JS获取系统时间--JavaScript基础

    1.网页中实时显示当前时间 <!DOCTYPE html><html lang="en"><head> <meta charset=&qu ...

  10. NexT 个性化设置

    NexT 主题添加分类页面 新建页面 在本地使用终端 cd 到 blog 文件夹下,执行如下命令: $ cd Documents/blog $ hexo new page categories 设置页 ...