Vulnerabilities / Threats

1/10/2018
05:10 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Cisco Adds Encrypted Traffic Analysis Function

New Encrypted Traffic Analytics is designed to help enterprises inspect encrypted traffic for malicious activity without having to decrypt it first.

After months of field trials, Cisco now has moved to general availability its Encrypted Traffic Analytics (ETA) technology that addresses the increasingly critical security challenge of inspecting encrypted traffic for malicious activity - without first having to decrypt it.

In addition to its campus switches, ETA will also now be available with a majority of Cisco's enterprise routing platforms including its branch office router, Integrated Services Router, and Cloud Services Routers, the company announced Jan 10.

Attackers have increasingly begun using encryption to hide payloads, command and control communications, data exfilitration, and other activity from conventional malware detection tools. The only way to inspect this traffic typically is to decrypt it first, which besides being technologically challenging can compromise the privacy of the encrypted traffic — a problem especially for organizations that are required to comply with certain data regulations. The US-CERT has even cautioned organizations about the dangers of implementing interception tools that weaken TLS security.

"The network is growing more and more opaque through encrypted transports," says Cisco principal engineer TK Keanini. "When threat actors use encrypted transports their activities are hidden and we cannot afford for any malicious activity to be hidden, as this is the primary way they will persist in your network. "

A study conduced by Zscaler showed malicious threats using SSL encryption doubling in the first six months of last year. The security vendor reported blocking an average of 12,000 phishing attempts delivered over SSL/TLS every day — a 400% increase over the previous year.  

Many of the new malware strains that the company blocked last year used SSL to encrypt C&C communications. Banking Trojans such as Dridex and Trickbot accounted for 60% of these payloads and ransomware accounted of 25% of the payloads using SSL/TLS encryption for C&C activity.

"Seventy percent of the traffic that we are seeing in the Zscaler cloud is encrypted," says Deepen Desai, Zscaler's director of research and operations. "And 54% of the advanced threats Zscaler blocks are hidden inside SSL traffic, making clear that inspecting SSL traffic is no longer optional."

Cisco's ETA is designed to give organizations a way to detect and block such threats. ETA's principal benefit, according to Cisco, is that it does not rely solely on decryption to inspect traffic.

Instead, the technique uses a combination of network telemetry and machine learning to look for differences between malicious and benign traffic in three specific features of encrypted data.

The first is the initial data packet of the connection, which often can contain important data about the rest of the encrypted content. Then it looks at the sequence of packet lengths and times for clues into traffic content that go beyond what is available in the initial packet. The third feature that ETA checks, is the byte distribution across the packet payloads within the encrypted traffic flow, according to the company.  ETA's ability to spot the telltale signs of malware in encrypted traffic is based on research the company conducted into understanding the differences in how malicious and benign traffic uses TLS, DNS, and HTTP.

"Encrypted Traffic Analytics not only finds malicious activities without decryption but it also helps organizations answer a critical question on a daily basis: How much of my digital business travels in the clear versus encrypted?" Keanini says.  The Cisco network itself is able deliver the needed telemetry for security thereby lowering administrative and operational costs, he says.

The essence of ETA is its ability to infer things from encrypted traffic, by passively monitoring it, rather than opening up and inspecting the contents. "Decryption is not a real option for many reasons," Keanini says. "We need to respect encryption and privacy while finding other methods to detect through inference not direct inspection."

According to Keanini, enterprises that have been testing ETA have reported gaining additional insight into what is encrypted on their network and the quality of that encryption as well.

The broader support for ETA announced this week means that enterprises can now get visibility into more of the encrypted traffic flowing across their networks. "All of these infrastructure software upgrades get you to a point where there is new telemetry being analyzed by Cisco Stealthwatch without the needs for decryption," Keanini says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Jaikumar Vijayan
50%
50%
Jaikumar Vijayan,
User Rank: Apprentice
1/11/2018 | 2:21:18 PM
Re: Without Decryption!
Thanks for catching that. It's been fixed. 
cybersins
100%
0%
cybersins,
User Rank: Apprentice
1/11/2018 | 7:06:09 AM
Without Decryption!
I guess there's a typo in the article - "Encrypted Traffic Analytics not only finds malicious activities with our decryption ..." should be "without".

My 2¢.
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.