<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Malware in encrypted traffic in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17656#M764</link>
    <description>&amp;gt; iluom (Newcomer I) posted a new topic in Tech Talk on 01-06-2019 01:31 AM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; Can anyone suggest ... How to detect or prevent malware in encrypted traffic&lt;BR /&gt;&lt;BR /&gt;As Cohen pointed out (in 1983), there are really only three ways to detect&lt;BR /&gt;malware, and each of them relies on being able to do some examination.&lt;BR /&gt;&lt;BR /&gt;So, basically, unless you can get people to encrypt in a homomorphic manner, the&lt;BR /&gt;answer is no.&lt;BR /&gt;&lt;BR /&gt;(I suppose I should qualify that: activity monitoring and change detection could&lt;BR /&gt;provide some alerts, but only "after the fact" ...)&lt;BR /&gt;&lt;BR /&gt;&amp;gt; without depending on a security tool&lt;BR /&gt;&lt;BR /&gt;That'd be interesting. You'd have to explain that one to me.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;nbsp; &amp;nbsp; I am aware that Cisco comes with&lt;BR /&gt;&amp;gt; Encrypted Traffic Analytics (ETA), which monitors network packet metadata to&lt;BR /&gt;&amp;gt; detect malicious traffic even if its encrypted&lt;BR /&gt;&lt;BR /&gt;You (or Cisco) would have to explain *that* one to me, as well. I suppose it could&lt;BR /&gt;rely on blacklisting of sites for source traffic or something ... Then again, I&lt;BR /&gt;suppose some kind of signature based IDS might be involved, if you are looking for&lt;BR /&gt;"malicious traffic" as opposed to malware ...&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
    <pubDate>Mon, 07 Jan 2019 19:31:52 GMT</pubDate>
    <dc:creator>rslade</dc:creator>
    <dc:date>2019-01-07T19:31:52Z</dc:date>
    <item>
      <title>Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17606#M757</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone suggest ...&lt;/P&gt;&lt;P&gt;How to detect or prevent malware in encrypted traffic without depending on a security tool&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am aware that Cisco comes with Encrypted Traffic Analytics (ETA), which monitors network packet metadata to detect malicious traffic even if its encrypted , but i would like to know any other suggestions for detection and prevention control&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 06:31:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17606#M757</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-01-06T06:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17609#M758</link>
      <description>Awesome question! Sadly the answer isn't so simple. Seems to me that you are looking at it from a defend the perimeter view point, which in my experience should be modified more to incident response. The issue is that encrypted traffic or even malformed frames can contain partial malware avoiding the devices, one suggestion would be to put in an ips behind the device the encrypted tunnel ends, so it could scan frames coming in from the unencrypted side, I'll do some due dilligence on this as well don't want to give crappy advice lol</description>
      <pubDate>Sun, 06 Jan 2019 13:35:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17609#M758</guid>
      <dc:creator>Curiousmind18</dc:creator>
      <dc:date>2019-01-06T13:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17622#M759</link>
      <description>&lt;P&gt;You could also choose to decrypt traffic at edge firewall, or at the IPS/web proxy in the middle.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do take consideration on the additional resource overhead it will put on the device so it wont affect its original function.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 23:37:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17622#M759</guid>
      <dc:creator>sergeling</dc:creator>
      <dc:date>2019-01-06T23:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17623#M760</link>
      <description>&lt;P&gt;With the majority of web and Internet traffic encrypted, you are right to be concerned about it being an avenue to malware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most web proxy filters (Bluecoat, Zscaler) and firewalls will also filter web pages that are from known bad sites without decryption.&amp;nbsp; Unless you are willing/able to decrypt the communications (e.g using man-in-the-middle techniques) you&amp;nbsp;are pretty much&amp;nbsp;limited to site-level reputation filtering, (e.g. known bad site, young DNS registration, caught hosting malware, etc).&amp;nbsp; With decryption, it becomes possible to delve deeper, such as allowing chat, but to denying file transfer; and also to AV scan individual files.&amp;nbsp; For example, Facebook is "social networking", but with decryption, you&amp;nbsp;get the ability to&amp;nbsp;allow chat while blocking file transfer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also useful is to watch for hosts going to known malware"phone home" sites.&amp;nbsp; This gives an indication of which hosts may already be infected and need remediation.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 01:42:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17623#M760</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-01-07T01:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17632#M761</link>
      <description>&lt;P&gt;For now, I have only seen Cisco ETA really working when it comes to encrypted traffic analysis. Although some other vendors claimed the ability to detect 0-day threads (e.g. Darktrace or Greycortex) from our testing the best results came from Cisco Stealthwatch with ETA.&lt;BR /&gt;&lt;BR /&gt;Some other options tough are able to do partial job in malware protection as well. But the majority of the function is based on reputation database for destination IPs/domains... (what is unable to discover malware communicating to twitter or instagram for example).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;So aside the Cisco ETA, you basically have another two good options:&lt;BR /&gt;&lt;BR /&gt;1. enhance end-point protection, where the communication is initiated and the payload is processed unencrypted (Cisco AMP for endpoints does great job as&amp;nbsp;it is tracking all operations and communication of the endpoint and the infection can be even discovered afterwards and you posses great data for retrospective analysis).&lt;BR /&gt;2. implement decryption at proxy in order to inspect payload.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 12:25:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17632#M761</guid>
      <dc:creator>Pista</dc:creator>
      <dc:date>2019-01-07T12:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17639#M762</link>
      <description>&lt;P&gt;solution at the end point / proxy seems a good choice but,&amp;nbsp;decrypting the traffic has a an impact in terms of time, performance and cost and in some areas is simply not possible because the necessary cryptographic keys aren't available.&lt;/P&gt;&lt;P&gt;The aspect of this approach, however, is that it may infringe the privacy policy.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 16:17:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17639#M762</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-01-07T16:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17648#M763</link>
      <description>&lt;P&gt;As others here have mentioned decryption at the edge device is a great way to accomplish this. If you go this route keep the following things in mind:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;* there is an impact to the througput/speed (although we have found it to be unnoticeable with the properly sized hardware)&lt;/P&gt;&lt;P&gt;* You will want to take into consideration things that you should *not* decrypt (HIPPA, etc)&lt;/P&gt;&lt;P&gt;* Thick client apps that use certificate pinning / hard coded certs will not play nice and will end up requiring exceptions&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 17:17:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17648#M763</guid>
      <dc:creator>OS22783</dc:creator>
      <dc:date>2019-01-07T17:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17656#M764</link>
      <description>&amp;gt; iluom (Newcomer I) posted a new topic in Tech Talk on 01-06-2019 01:31 AM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; Can anyone suggest ... How to detect or prevent malware in encrypted traffic&lt;BR /&gt;&lt;BR /&gt;As Cohen pointed out (in 1983), there are really only three ways to detect&lt;BR /&gt;malware, and each of them relies on being able to do some examination.&lt;BR /&gt;&lt;BR /&gt;So, basically, unless you can get people to encrypt in a homomorphic manner, the&lt;BR /&gt;answer is no.&lt;BR /&gt;&lt;BR /&gt;(I suppose I should qualify that: activity monitoring and change detection could&lt;BR /&gt;provide some alerts, but only "after the fact" ...)&lt;BR /&gt;&lt;BR /&gt;&amp;gt; without depending on a security tool&lt;BR /&gt;&lt;BR /&gt;That'd be interesting. You'd have to explain that one to me.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;nbsp; &amp;nbsp; I am aware that Cisco comes with&lt;BR /&gt;&amp;gt; Encrypted Traffic Analytics (ETA), which monitors network packet metadata to&lt;BR /&gt;&amp;gt; detect malicious traffic even if its encrypted&lt;BR /&gt;&lt;BR /&gt;You (or Cisco) would have to explain *that* one to me, as well. I suppose it could&lt;BR /&gt;rely on blacklisting of sites for source traffic or something ... Then again, I&lt;BR /&gt;suppose some kind of signature based IDS might be involved, if you are looking for&lt;BR /&gt;"malicious traffic" as opposed to malware ...&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Mon, 07 Jan 2019 19:31:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17656#M764</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-01-07T19:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17662#M765</link>
      <description />
      <pubDate>Mon, 07 Jan 2019 20:45:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17662#M765</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-01-07T20:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17670#M766</link>
      <description>How ETA works: &lt;A href="https://www.networkworld.com/article/3246195/lan-wan/how-cisco-s-newest-security-tool-can-detect-malware-in-encrypted-traffic.html" target="_blank"&gt;https://www.networkworld.com/article/3246195/lan-wan/how-cisco-s-newest-security-tool-can-detect-malware-in-encrypted-traffic.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Obviously not able to inspect actual payload, but uses metadata to do the magic. Don't think about it as a sole protection, rather an enhancement to infrastructure defense.</description>
      <pubDate>Mon, 07 Jan 2019 21:40:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17670#M766</guid>
      <dc:creator>Pista</dc:creator>
      <dc:date>2019-01-07T21:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17699#M767</link>
      <description>&amp;gt; Pista (Newcomer I) posted a new reply in Tech Talk on 01-07-2019 04:40 PM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; How ETA works:&lt;BR /&gt;&amp;gt; &lt;A href="https://www.networkworld.com/article/3246195/lan-wan/how-cisco-s-newest-security" target="_blank"&gt;https://www.networkworld.com/article/3246195/lan-wan/how-cisco-s-newest-security&lt;/A&gt;&lt;BR /&gt;&amp;gt; -tool-can-detect-malware-in-encrypted-traffic.html&lt;BR /&gt;&lt;BR /&gt;OK, yeah, basically stateful inspection on packet headers only.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;Be a scribe! Your body will be sleek, your hand will be soft. You&lt;BR /&gt;are one who sits grandly in your house; your servants answer&lt;BR /&gt;speedily; beer is poured copiously; all who see you rejoice in&lt;BR /&gt;good cheer. Happy is the heart of him who writes; he is young&lt;BR /&gt;each day. - Ptahhotep, Vizier to Isesi, 5th Dynasty, 2300 BC&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Mon, 07 Jan 2019 23:18:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17699#M767</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-01-07T23:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17700#M768</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ETA solutions look for patterns in the traffic, read un-encrypted metadata,&amp;nbsp;flag suspicious packets, and&amp;nbsp;so on ---&amp;nbsp;but&amp;nbsp;if the traffic&amp;nbsp;isn't&amp;nbsp;actually decrypted for full inspection, there's no guarantee that it's devoid of malware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/637665353"&gt;@iluom&lt;/a&gt;, if implementing decryption at an intermediate device --- such as a proxy --- raises privacy concerns,&amp;nbsp;you could attempt to tailor it. For example, I've added an exception&amp;nbsp;to our privacy policy&amp;nbsp;for the inspection of&amp;nbsp;data coming into&amp;nbsp;our organization's network. (I confess, I&amp;nbsp;work in KSA where&amp;nbsp;employee privacy isn't of so much concern)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the end of the day, preventing such attacks --- or at least reducing their impact --- calls for an approach with defense-in-depth. You&amp;nbsp;should have preventive and detective measures implemented at the perimeter, the end-points, and the entire networks, with&amp;nbsp;the solutions integrated with one-another.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If a perimeter device using ETA doesn't detect malware,&amp;nbsp;&amp;amp;&amp;nbsp;it gets decrypted on&amp;nbsp;a user's system, an end-point security system there can quarantine the malware &amp;amp;isolate the system, as well as relay information to integrated systems to take actions at the network level.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With a layered approach, you have some assurance that should malware get past one layer,&amp;nbsp;it&amp;nbsp;still has to get through others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can't&amp;nbsp;always&amp;nbsp;depend on employee awareness here --- someone who sees his system acting strangely may just lean back and start using his smart phone rather than call Support --- so the&amp;nbsp;solution should also be properly configured to alert the IT Security team.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 23:19:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17700#M768</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-01-07T23:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17813#M790</link>
      <description>&lt;P&gt;Interesting that most have concentrated on a single vendor Cisco.&amp;nbsp; If you look carefully within Government circles within their policies and controls, often they mandate TLS decryption for web traffic and also Identity and Access Portals.&amp;nbsp;&amp;nbsp; So to give you some examples: &amp;nbsp; Identity Security Access Manager (ISAM) for Business - has a web proxy, called WebSeal, which has proxies for both mobile and web services, which has an inbuilt layer 4 to layer 7 WAF, which by using the server digital certificate, can decrypt and check the incoming and outcoming traffic, before it allowed into the organisations web servers/farm etc.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other vendors use F5 with its Advanced Security Module, which has good layer 4 to layer 7 TLS inspection capabilities in virtual or physical formats.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, from experience, you need plenty of testing, non production and Proof of Concepts, going because often the claims of manufacturers, has to be verified and tested carefully - sometimes their claims do not add up in reality.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 03:06:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17813#M790</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-01-11T03:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17820#M791</link>
      <description>&lt;P&gt;surely there are many vendors offering "man in the middle" decryption and inspection. but the original question was about ability to detect malware within encrypted traffic...&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 08:57:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17820#M791</guid>
      <dc:creator>Pista</dc:creator>
      <dc:date>2019-01-11T08:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17848#M797</link>
      <description>&lt;P&gt;In that case you will always need the ability to decrypt the incoming transmission, and you may have re-encrypt it again by policy, before it is forwarded on to the final destination.&amp;nbsp; Normally, one would have an assured solution, as it normally has to hold a copy of the private key for decryption purpose.&amp;nbsp; Normally the solution has&amp;nbsp; normally a proxy or an SSL/TLS forwarding capability with layer 4 to layer 7 inspection capabilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jan 2019 03:42:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/17848#M797</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-01-12T03:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/20858#M1069</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WAF (Web Application Firewalls) may help to address this issue&lt;/P&gt;&lt;P&gt;These firewalls are specific enough that they know the way the application should be behaving&lt;BR /&gt;and can detect even the smallest unusual activity and bring it to a stop. In addition, WAFs&lt;BR /&gt;can also provide protection against such network-based attacks as DoS or DDoS attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reverse and Forward Proxy would help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any comments please??&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 06:55:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/20858#M1069</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-04-06T06:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/20859#M1070</link>
      <description>&lt;P&gt;Yes, you could do it that way - there also other means, via having a front web application proxy or Mobile aware proxy, with one way key decryption or as you state forward or reverse proxy as well.&amp;nbsp; Also there is appears to be another method - using a cloud based web application API, which some vendors provide as a stop gap, to keep PCI DSS issues arising i.e. TLS V1.0 issues and preventing access and related vulnerabilities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is more like a stop gap approach, rather than a permanent, but often see it taken up as a solution, which appears to become the norm,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 07:00:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/20859#M1070</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-04-06T07:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/20869#M1076</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/637665353"&gt;@iluom&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WAF (Web Application Firewalls) may help to address this issue&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/637665353"&gt;@iluom&lt;/a&gt;, what / whom do you ultimately want to protect from the malware?&amp;nbsp; Whatever solution you employ, it will have to be able to decrypt the traffic --- unless that isn't permitted by your organization's policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep in mind that a WAF is meant to protect a Web Application itself, and not end-users / end-points.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 10:51:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/20869#M1076</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-04-06T10:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Malware in encrypted traffic</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/20882#M1084</link>
      <description>&lt;P&gt;&amp;gt; iluom (Contributor I) posted a new reply in Tech Talk on 04-06-2019 02:55 AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; &amp;nbsp; &amp;nbsp; WAF (Web Application Firewalls) may help to address this issue These&lt;BR /&gt;&amp;gt; firewalls are specific enough that they know the way the application should be&lt;BR /&gt;&amp;gt; behaving and can detect even the smallest unusual activity and bring it to a&lt;BR /&gt;&amp;gt; stop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application level firewalls get really complicated really quickly. Some may have a heuristic activity monitoring component, but only something with an added host-based sensor component is actually going to detect resultant unusual activity.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 17:56:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Malware-in-encrypted-traffic/m-p/20882#M1084</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-04-06T17:56:04Z</dc:date>
    </item>
  </channel>
</rss>

