A group of Cisco researchers have managed to spot malicious traffic in encrypted traffic without any need to decrypt data. The discovery could pave the way for products that can secure networks while maintaining privacy. Peter Kosinar, Researcher at ESET commented below.
Peter Kosinar, Researcher at ESET:
“The findings in t
I certainly don’t know if *this* specific approach will be used by any security vendor; but many of them do employ a variety of methods based on structural properties of network communication, be it encrypted or not. I would also expect this kind of detection to be employed in network-based security solutions, rather than host-based ones (i.e. a security system running on your router, firewall or similar network component, rather than an endpoint computer); the latter have better information about what is happening on the computer and can thus base their decisions on far more data than “just” the network flow. The whole experiment was also undertaken in enterprise environment — which is the kind of environment where network-based security solutions are mostly employed.
There are many simple approaches to avoiding this type of detection — using existing open-source browser implementations (e.g. taking parts of Firefox or Chromium’s source code) would make the client side of communication behave exactly like the browser does.
Alternatively, one could just hijack the pre-existing browser on the system to do all the network communication; thus making its communication patterns completely indistinguishable from the browser’s regular behaviour. And, of course, one can just employ encryption within the HTTP protocol, rather than on top of it, as SSL/TLS do. The server-side of communication can be circumvented using known legitimate services, like Dropbox or Google Drive as C&C… which is something already being done by some families of malware. Of course, *whether* the bad guys do so… is another question. They certainly have no reason to even attempt to avoid this kind of detection before someone actually implements in their products.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.