Thursday, January 30, 2025
HomeSecurity NewsCisco ETA - Provides Solution for Detecting Malware in Encrypted Traffic

Cisco ETA – Provides Solution for Detecting Malware in Encrypted Traffic

Published on

SIEM as a Service

Follow Us on Google News

Encrypted traffic is one of the biggest challenges in the security Industry and now Cisco comes with a solution for it. Cisco ETA was announced in the last June and now it came for general availability.

Cisco ETA inspects the contents of the encrypted traffic without breaking the packets, it uses network visibility and multi-layer machine learning to look for observable differences.

First, ETA examines the initial data packet of the connection. This by itself may contain valuable data about the rest of the content. Then there is the sequence of packet lengths and times, which offers vital clues into traffic contents beyond the beginning of the encrypted flow. Since this network-based detection process is aided by machine learning, it adapts to change and its efficacy is maintained over time.

Cisco says ETA can identify the quality of encryption, gives visibility and knowledge of what data being encrypted in your network.

Also Read Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

Initially Cisco ETA available only with campus switches, the Catalyst 9300 and 9400 series and now it extended to routing platforms.

  • Integrated Services Router (ISR): 4000 Series, the new 1000 Series, ISRv on ENCS 5000 series.
  • Aggregation Services Router (ASR) 1000 series.
  • Cloud Services Router (CSR) 1000V.

Cisco says it preserves the privacy of legitimate traffic and analyzes encrypted traffic by observing through passive monitoring and it adapts to change and its efficacy is maintained over time.

Gartner report says in 2019 more than 80 percent traffic of corporate traffic is encrypted and more than 50 percent of malware campaigns uses encryption and obfuscation techniques.

Cisco concluded that “We’re excited to bring these much-needed security innovations to our customers and we will be rolling out additional capabilities in the months to come“.

Below is the Cisco ETA video representation

https://youtu.be/KL8SxtZLeqc

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

Microsoft Enhances Windows 11 Security with Admin Protection to Prevent Crowdstrike-Like Incident

Microsoft has introduced "Administrator Protection" (AP), a sophisticated security feature aimed at elevating Windows...

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in...