{"title":"Encryption blind spots: shining a light on cloud network traffic","authors":"Mark Jow","doi":"10.12968/s1353-4858(23)70054-8","DOIUrl":null,"url":null,"abstract":"Monitoring for and detecting malicious activity on your networks is being made harder by the increasing volume of encrypted traffic. This encryption exists for good reasons, particularly when cloud services are in play, but threat actors are exploiting its inscrutability to gain access to networks and loiter for extended periods. However, extended Berkeley Packet Filter (eBPF) network analysis technology offers the possibility to gain full visibility into encrypted traffic across VM or container workloads.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"18 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(23)70054-8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Monitoring for and detecting malicious activity on your networks is being made harder by the increasing volume of encrypted traffic. This encryption exists for good reasons, particularly when cloud services are in play, but threat actors are exploiting its inscrutability to gain access to networks and loiter for extended periods. However, extended Berkeley Packet Filter (eBPF) network analysis technology offers the possibility to gain full visibility into encrypted traffic across VM or container workloads.