Piecing Together Malicious Behavior in Encrypted Traffic
By Jan Kohout This post was authored by Jan Kohout, Veronica Valeros and Petr Somol. Increasing adoption of encryption in web communication significantly contributes to protection of users‘ privacy. However, it also brings tough challenges for intrusion detection systems that need to analyze the traffic without actually decrypting it. There is not much information left in encrypted web […]
Source:: Cisco Security Notice