Sunday, September 8, 2024
HomeSecurity NewsCisco ETA - Provides Solution for Detecting Malware in Encrypted Traffic

Cisco ETA – Provides Solution for Detecting Malware in Encrypted Traffic

Published on

Encrypted traffic is one of the biggest challenges in the security Industry and now Cisco comes with a solution for it. Cisco ETA was announced in the last June and now it came for general availability.

Cisco ETA inspects the contents of the encrypted traffic without breaking the packets, it uses network visibility and multi-layer machine learning to look for observable differences.

First, ETA examines the initial data packet of the connection. This by itself may contain valuable data about the rest of the content. Then there is the sequence of packet lengths and times, which offers vital clues into traffic contents beyond the beginning of the encrypted flow. Since this network-based detection process is aided by machine learning, it adapts to change and its efficacy is maintained over time.

Cisco says ETA can identify the quality of encryption, gives visibility and knowledge of what data being encrypted in your network.

- Advertisement - EHA

Also Read Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

Initially Cisco ETA available only with campus switches, the Catalyst 9300 and 9400 series and now it extended to routing platforms.

  • Integrated Services Router (ISR): 4000 Series, the new 1000 Series, ISRv on ENCS 5000 series.
  • Aggregation Services Router (ASR) 1000 series.
  • Cloud Services Router (CSR) 1000V.

Cisco says it preserves the privacy of legitimate traffic and analyzes encrypted traffic by observing through passive monitoring and it adapts to change and its efficacy is maintained over time.

Gartner report says in 2019 more than 80 percent traffic of corporate traffic is encrypted and more than 50 percent of malware campaigns uses encryption and obfuscation techniques.

Cisco concluded that “We’re excited to bring these much-needed security innovations to our customers and we will be rolling out additional capabilities in the months to come“.

Below is the Cisco ETA video representation

https://youtu.be/KL8SxtZLeqc

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

IBM has issued a security bulletin addressing critical vulnerabilities in its MQ Operator and...

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...