Adding a method to delete a bad sequence in a signature after we test the produced...
[pingpong.git] / Code / Projects / SmartPlugDetector / src / main / java / edu / uci / iotproject / detection / ClusterMatcher.java
index 26979092397fd53628f11b3462ffc8d09a59f75e..279ceeaf1c868e7b9b8664d4e00bfd656b9ef548 100644 (file)
@@ -134,16 +134,6 @@ public class ClusterMatcher implements PacketListener {
                 // Skip empty conversations.
                 continue;
             }
-            // TODO: DEBUG!!!
-            /*List<PcapPacket> listPP = c.getPackets();
-            if(listPP.size() > 1000) {
-                for (PcapPacket pp : listPP) {
-                    if (pp.length() == 639) {
-                        boolean test = c.isTls();
-                        System.out.println("Sequence has 639! " + test);
-                    }
-                }
-            }*/
             for (List<PcapPacket> signatureSequence : mCluster) {
                 if (isTlsSequence(signatureSequence) != c.isTls()) {
                     // We consider it a mismatch if one is a TLS application data sequence and the other is not.