Encryption is the process of converting plaintext to ciphertext to ensure only the intended recipients have access to the actual data. An algorithm is used to encode the data, and the same algorithm is used at the receiving end to decode the data. Encryption is classified into two types, symmetric key and public key.
The threat landscape
Encryption has been observed to be used by malicious actors to cover their command-and-control (C2) activities, giving them more time to inflict damage on the infected systems. There is a rising trend of threat incidents observed to be masked in the encrypted traffic.
Detecting malicious encrypted traffic
With attackers also encrypting their traffic, it is important for organizations to deploy tools and techniques to spot malicious encrypted traffic.
Publisher