The Rise of Encrypted Traffic
来源:互联网 发布:system halted linux 编辑:程序博客网 时间:2024/04/30 09:17
The Rise of Encrypted Traffic
Based on proven standards like Secure Sockets Layer (SSL) and Transport Layer Security (TLS), encrypted communication is, unquestionably, growing rapidly. NSS Research found that 25% to 35% of network traffic is encrypted within most organizations today, and will continue to rise 1. Due to growing data security, privacy and compliance concerns, organizations worldwide are utilizing more SSL encrypted traffic. Additionally, Gartner believes that by 2017, more than half of the network attacks targeting enterprises will use encrypted traffic to bypass controls 2. Although the increasing pervasiveness of Cloud and mobile-based services offers significant benefits to enterprises, the encrypted traffic that protects data from being viewed within these modern applications also creates a blind spot that can be exploited by advanced threats and malware.
Research conducted by Canadian broadband management company Sandvine, found that the number of Internet users encrypting their online communications has doubled in North America, and quadrupled in Latin America and Europe over just the past year 3. The rise in SSL encrypted traffic is not restricted to desktops, as the mobile community is also using increasingly more encryption for communications. While the encrypted internet traffic figures are not tremendously large – at 6.1%, 3.8% and 10.4%, respectively – the overall growth is significant to users and businesses worldwide as it may be a harbinger of new security models.
Data breaches and other activities have spawned a renewed interest in privacy and policies protecting confidential user data, so the increased use of encryption is really not that surprising. Web and content service providers like Google, Dropbox and Salesforce.com, as well as application developers such as Yahoo, Amazon Web Services (AWS) and Microsoft, have been migrating to encrypted communications as a default for some time.
Perhaps what’s of greater concern is the rapid increase in advanced persistent threats (APTs) and malware that hide in encrypted traffic and evade detection by conventional security tools. In fact, advanced malware and encrypted traffic played a role in almost every major breach in 2013 and 2014. While more than 25% of outbound web traffic is now encrypted, 80% of security systems do not recognize or prevent threats within SSL traffic 2.
To identify hidden threats to the business, enterprises need complete visibility into the encrypted traffic coming in and out of the network. However, to comply with local privacy regulations that protect certain classes of data — such as financial or health-related — as well as with corporate policies on the acceptable use of applications, organizations must be able to selectively decrypt network traffic. An encrypted traffic management strategy that considers the various business needs, the corporate policies established, and the compliance mandates for your industry is essential. Click here to learn more about Blue Coat’s encrypted traffic management products.
1 W. Pirc, "SSL Performance Problems: Significant SSL Performance Loss Leaves Much Room for Improvement," NSS Labs, June 2013.
2 Jeremy D’Hoinne, Adam Hills, “Security leaders Must address threats from Rising SSL Traffic”, Gartner, December 2013.
3 Sandvine, “Global Internet Phenomena Report,” May 2014.
- The Rise of Encrypted Traffic
- The Rise of the Private-Sector Military
- The Rise of ``Worse is Better''
- The Rise And Fall of ONline Companies
- The Rise of Worse is Better
- Machine Learning for Encrypted Malware Traffic Classification
- configure the logging of Denied Traffic to a FG
- 纽约时报:百度的崛起(The Rise of Baidu )
- Structured vs. Unstructured Data: The Rise of Data Anarchy
- Facebook, Google, and the Rise of Open Source Security Software
- Rise of Nations玩法
- [[Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS]]
- What is the phenomenon contributes to the rise of multicore computing?
- ZOJ_2104_Let the Balloon Rise
- Hdu_1004_Let the Balloon Rise
- Let the Balloon Rise
- Let the Balloon Rise
- Let the Balloon Rise
- 平时常用的信息
- 继承的使用
- IT运维服务中的一些工作思路探索(二)
- 游客不愿骑马被打骨折
- 一个典型的简单shell字符串处理脚本
- The Rise of Encrypted Traffic
- git常用命令
- 为什么String是不可变的
- VM Depot 分布式计算框架主题应用精选
- Search in Rotated Sorted Array
- IE8下,采用autocomplete插件不展示补全信息
- RAC检查命令
- ORACLE PL/SQL编程详解之二:PL/SQL块结构和组成元素
- 深入理解java异常处理机制