Sunday, December 10, 2023

Cisco ETA – Provides Solution for Detecting Malware in Encrypted Traffic

Encrypted traffic is one of the biggest challenges in the security Industry and now Cisco comes with a solution for it. Cisco ETA was announced in the last June and now it came for general availability.

Cisco ETA inspects the contents of the encrypted traffic without breaking the packets, it uses network visibility and multi-layer machine learning to look for observable differences.

First, ETA examines the initial data packet of the connection. This by itself may contain valuable data about the rest of the content. Then there is the sequence of packet lengths and times, which offers vital clues into traffic contents beyond the beginning of the encrypted flow. Since this network-based detection process is aided by machine learning, it adapts to change and its efficacy is maintained over time.

Cisco says ETA can identify the quality of encryption, gives visibility and knowledge of what data being encrypted in your network.

Also Read Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

Initially Cisco ETA available only with campus switches, the Catalyst 9300 and 9400 series and now it extended to routing platforms.

  • Integrated Services Router (ISR): 4000 Series, the new 1000 Series, ISRv on ENCS 5000 series.
  • Aggregation Services Router (ASR) 1000 series.
  • Cloud Services Router (CSR) 1000V.

Cisco says it preserves the privacy of legitimate traffic and analyzes encrypted traffic by observing through passive monitoring and it adapts to change and its efficacy is maintained over time.

Gartner report says in 2019 more than 80 percent traffic of corporate traffic is encrypted and more than 50 percent of malware campaigns uses encryption and obfuscation techniques.

Cisco concluded that “We’re excited to bring these much-needed security innovations to our customers and we will be rolling out additional capabilities in the months to come“.

Below is the Cisco ETA video representation


Latest articles

WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack

A critical remote code execution vulnerability has been patched as part of the Wordpress...

Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts

Hackers target email accounts because they contain valuable personal and financial information. Successful email...

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid...

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative...

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

Endpoint Strategies for 2024 and beyond

Converge and Defend

What's the pulse of Unified Endpoint Management and Security (UEMS) in Europe? Join us live to uncover the strategies that are defining endpoint security in the region.

Related Articles