Cisco Can Now Sniff Out Malware Inside Encrypted Traffic
Joined: Oct 24 2009
Last Active: Never/Not tracked
Total Active: Never/Not tracked
Timezone: GMT+ -7
Last Page Viewed:
January 12 '18 at 07:30 AM
By msmash from
Slashdot's next-up department
Simon Sharwood, writing for The Register: Cisco has switched on latent features in its recent routers and switches, plus a cloud service, that together make it possible to detect the fingerprints of malware in encrypted traffic. Switchzilla has not made a dent in transport layer security (TLS) to make this possible. Instead, as we reported in July 2016, Cisco researchers found that malware leaves recognisable traces even in encrypted traffic. The company announced its intention to productise that research last year and this week exited trials to make the service -- now known as Encrypted Traffic Analytics (ETA) -- available to purchasers of its 4000 Series Integrated Service Routers, the 1000-series Aggregation Services Router and the model 1000V Cloud Services Router 1000V. Those devices can't do the job alone: users need to sign up for Cisco's StealthWatch service and let traffic from their kit flow to a cloud-based analytics service that inspects traffic and uses self-improving machine learning algorithms to spot dodgy traffic.
Forgot name or password?
Click here to get them
Not a member?
Click here to join
: Large flux of old-but-been-broken news stories coming through.
: Need that for all dialogue in all things ever. Gone with the Wind: Gilbert Gottfried version
: Dream do come true. Gilbert Gottfried https://www.youtube.com/watch?v=3H3xQzQauyY