\section{Conclusion}
With highly limited resources we were able to develop an analysis architecture that can cleanly process large amounts of packet data. These techniques will prove useful for continued capture based analysis systems and provide groundwork for future streaming solutions. \\

While some of the data suggest intentional manipulation of packet creation which created apparent reductions in entropy, some of the errors are clearly from either implementation errors or bit-errors resulting from corruption of the data stream. Of these, the most serious are the implementation errors.\\ 

Overall we found that while most implementations of TCP have no detectable issues with randomness in our measured flows, many SSL/TLS implementations remain vulnerable. Much works remains to be done to identify specific issues within implementations and this is left for further work.\\
