Info Image

ETSI Identifies Problems Arising from Pervasive Encrypted Traffic

ETSI Identifies Problems Arising from Pervasive Encrypted Traffic Image Credit: ETSI

ETSI’s Industry Specification Group on Encrypted Traffic Integration (ISG ETI) has concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks.

In the group’s first report, ETSI GR ETI 001, entitled Encrypted Traffic Integration (ETI); Problem Statement, ISG ETI identifies the impact of encrypted traffic on stakeholders and how these stakeholders' objectives interrelate. The rise of the use of encryption places networks and users at risk, whilst offering promises of security.

The use of encryption as the default approach to enhance the security of communications has become increasingly common. While there are often benefits, in many scenarios, the use of encryption exposes users to threats from malicious traffic which, since it is not recognized because it is hidden by encryption, can no longer be filtered out by the network operator to protect the end user. The use of end-to-end encryption can restrict the ability of network management, anti-fraud, cybersecurity, and regulatory monitoring systems to manage data and communications flowing into, through, and out of networks.

 

Encryption protects traffic flowing through a network from unauthorized inspection. Nevertheless, encryption in itself does not protect the communicating end points from attack and reduces the ability of firewalls, in combination with other network management systems, to remove malicious traffic. Without being over-dramatic, the rise of a pervasive encryption model allows many of the worst elements of societal and human behaviour to go unobserved, because trusted networks are not able to help to protect users.

The role of ETSI ISG ETI is to enable all the positive attributes of pervasive encryption to be enhanced, whilst allowing the networks to operate. This requires a deeper understanding of the problem, as evidenced in the GR ETI 001.

Scott Cadzow, ETSI ISG ETI Vice-Chair
The next step is to develop a set of requirements for the use of encryption, to offer a balance that allows network operation, while giving the user an assurance of confidentiality. This requirements analysis should be ready by the end of 2021.

NEW REPORT:
Next-Gen DPI for ZTNA: Advanced Traffic Detection for Real-Time Identity and Context Awareness
Author

Ray is a news editor at The Fast Mode, bringing with him more than 10 years of experience in the wireless industry.

For tips and feedback, email Ray at ray.sharma(at)thefastmode.com, or reach him on LinkedIn @raysharma10, Facebook @1RaySharma

PREVIOUS POST

Ransomware Attacks Across the Globe Locked 68 Healthcare OT Facilities

NEXT POST

Data traffic on KPN Fixed Network Grew 40% Due to Pandemic