“Instead, efforts should be made to find a more amenable approach, which may be analytics of intent associated with encrypted traffic without having to peek into the payload.”

“How great would it be to be the attacker who got in before your fancy baseline was established as the norm?” Pearson asks rhetorically.

sc magazine logo

Read more …

Network Traffic Analysis
Security Analysis