Vulnerabilities / Threats

1/10/2018
05:10 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Cisco Adds Encrypted Traffic Analysis Function

New Encrypted Traffic Analytics is designed to help enterprises inspect encrypted traffic for malicious activity without having to decrypt it first.

After months of field trials, Cisco now has moved to general availability its Encrypted Traffic Analytics (ETA) technology that addresses the increasingly critical security challenge of inspecting encrypted traffic for malicious activity - without first having to decrypt it.

In addition to its campus switches, ETA will also now be available with a majority of Cisco's enterprise routing platforms including its branch office router, Integrated Services Router, and Cloud Services Routers, the company announced Jan 10.

Attackers have increasingly begun using encryption to hide payloads, command and control communications, data exfilitration, and other activity from conventional malware detection tools. The only way to inspect this traffic typically is to decrypt it first, which besides being technologically challenging can compromise the privacy of the encrypted traffic — a problem especially for organizations that are required to comply with certain data regulations. The US-CERT has even cautioned organizations about the dangers of implementing interception tools that weaken TLS security.

"The network is growing more and more opaque through encrypted transports," says Cisco principal engineer TK Keanini. "When threat actors use encrypted transports their activities are hidden and we cannot afford for any malicious activity to be hidden, as this is the primary way they will persist in your network. "

A study conduced by Zscaler showed malicious threats using SSL encryption doubling in the first six months of last year. The security vendor reported blocking an average of 12,000 phishing attempts delivered over SSL/TLS every day — a 400% increase over the previous year.  

Many of the new malware strains that the company blocked last year used SSL to encrypt C&C communications. Banking Trojans such as Dridex and Trickbot accounted for 60% of these payloads and ransomware accounted of 25% of the payloads using SSL/TLS encryption for C&C activity.

"Seventy percent of the traffic that we are seeing in the Zscaler cloud is encrypted," says Deepen Desai, Zscaler's director of research and operations. "And 54% of the advanced threats Zscaler blocks are hidden inside SSL traffic, making clear that inspecting SSL traffic is no longer optional."

Cisco's ETA is designed to give organizations a way to detect and block such threats. ETA's principal benefit, according to Cisco, is that it does not rely solely on decryption to inspect traffic.

Instead, the technique uses a combination of network telemetry and machine learning to look for differences between malicious and benign traffic in three specific features of encrypted data.

The first is the initial data packet of the connection, which often can contain important data about the rest of the encrypted content. Then it looks at the sequence of packet lengths and times for clues into traffic content that go beyond what is available in the initial packet. The third feature that ETA checks, is the byte distribution across the packet payloads within the encrypted traffic flow, according to the company.  ETA's ability to spot the telltale signs of malware in encrypted traffic is based on research the company conducted into understanding the differences in how malicious and benign traffic uses TLS, DNS, and HTTP.

"Encrypted Traffic Analytics not only finds malicious activities without decryption but it also helps organizations answer a critical question on a daily basis: How much of my digital business travels in the clear versus encrypted?" Keanini says.  The Cisco network itself is able deliver the needed telemetry for security thereby lowering administrative and operational costs, he says.

The essence of ETA is its ability to infer things from encrypted traffic, by passively monitoring it, rather than opening up and inspecting the contents. "Decryption is not a real option for many reasons," Keanini says. "We need to respect encryption and privacy while finding other methods to detect through inference not direct inspection."

According to Keanini, enterprises that have been testing ETA have reported gaining additional insight into what is encrypted on their network and the quality of that encryption as well.

The broader support for ETA announced this week means that enterprises can now get visibility into more of the encrypted traffic flowing across their networks. "All of these infrastructure software upgrades get you to a point where there is new telemetry being analyzed by Cisco Stealthwatch without the needs for decryption," Keanini says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Jaikumar Vijayan
50%
50%
Jaikumar Vijayan,
User Rank: Apprentice
1/11/2018 | 2:21:18 PM
Re: Without Decryption!
Thanks for catching that. It's been fixed. 
cybersins
100%
0%
cybersins,
User Rank: Apprentice
1/11/2018 | 7:06:09 AM
Without Decryption!
I guess there's a typo in the article - "Encrypted Traffic Analytics not only finds malicious activities with our decryption ..." should be "without".

My 2¢.
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17182
PUBLISHED: 2018-09-19
An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations...
CVE-2018-17144
PUBLISHED: 2018-09-19
Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...