Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security //

Firewall

// // //
4/19/2018
12:10 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

Firewall Fail: IT Can't Identify All Network Traffic

With more and more traffic being encrypted, IT departments are having difficulty identifying the source of traffic coming into their network and past the firewall.

SAN FRANCISCO -- There's a dirty secret lying right behind the corporate firewall: The IT department can't identify the traffic coming into the enterprise network.

In fact, IT managers can't identify 45% of the network traffic hitting the firewall on any given day, according to a new report. Additionally, almost one in four IT managers cannot identify 70% of their enterprise's traffic.

Much of that is being caused by increased use of encryption, said Chester Wisniewski, the chief research scientist for Sophos, which sponsored the study, "The Dirty Secrets of Network Firewalls."

"Fifteen years ago, [IT admins] could go into their firewall and look at it from a productivity and a security standpoint and understand what was happening from a security standpoint because stuff was not encrypted," Wisniewski told Security Now.

"You knew this was Spotify and you know this was going to AOL and what was anomalous would stand out, and you could more easily make rules and policy decisions and even forensics," Wisniewski added. "Now, you don't know what was stolen because all the data is encrypted."

Part of that is related to Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols that have helped encrypt more and more traffic passing through the Internet. To help combat that, enterprises can use man-in-the-middle techniques, but that adds complexity to the whole process. Additionally, standards -- specifically TLS 1.3 -- will also change that and make it more difficult.

The result is that 84% of respondents told researchers that lack of application visibility is now a serious security concern.

"What the survey said to us is that these guys don't know what apps are on the network because everything is TLS and SSL," Wisniewski said, adding that in his estimation about 70% of network traffic is encrypted today and that number could reach nearly 100% in the coming years.

The report, which Sophos released this week to coincide with the 2018 RSA Conference here, is based on responses from 2,700 IT professionals in mid-sized enterprises from the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India and South Africa.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

In the coming months, with the increased use in encryption coming, Wisniewski said the challenge for the industry, including vendors such as Sophos, is to get endpoint devices, which know what the traffic is before it's encrypted, to work with and communicate with the firewall to specify what traffic can go past and onto the network.

(For its part, Sophos offers this technology with two offerings: synchronized security technology and Sync App Control.)

Without that, IT admins are losing time to do maintenance. The study found that most enterprises spend an average of seven days each month to remediate and fix about 16 infected machines. Over half of those surveyed expressed concern about loss of productivity from unwanted and unnecessary apps that find their way onto the network.

In addition, nearly 100% of those surveyed want firewall activity that can automatically isolate infected machines.

"We know that you can't block everything, and that's why we have talked about layered security," Wisniewski said. "If someone is in there, within the network, can you at least stop them before they leave with the stolen goods."

Related posts:

— Scott Ferguson, is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-45045
PUBLISHED: 2022-12-01
Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow authenticated users to execute arbitrary commands as root, as exploited in the wild starting in approximately 2019. A remote and authenticated attacker...
CVE-2022-45640
PUBLISHED: 2022-12-01
Tenda Tenda AC6V1.0 V15.03.05.19 is affected by buffer overflow. Causes a denial of service (local).
CVE-2022-40489
PUBLISHED: 2022-12-01
ThinkCMF version 6.0.7 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows a Super Administrator user to be injected into administrative users.
CVE-2022-40849
PUBLISHED: 2022-12-01
ThinkCMF version 6.0.7 is affected by Stored Cross-Site Scripting (XSS). An attacker who successfully exploited this vulnerability could inject a Persistent XSS payload in the Slideshow Management section that execute arbitrary JavaScript code on the client side, e.g., to steal the administrator's P...
CVE-2022-44262
PUBLISHED: 2022-12-01
ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE).