Info Image

How Behavioral DPI and Encryption Proxies Can Restore Enterprise Network Visibility: Markus Irle, LANCOM Systems

How Behavioral DPI and Encryption Proxies Can Restore Enterprise Network Visibility: Markus Irle, LANCOM Systems Image Credit: LANCOM Systems

The Fast Mode spoke to Markus Irle, VP Firewall and Security at LANCOM Systems on new encryption technologies and their impact on today's networks. Markus joins us in a series of discussions with leading vendors in the traffic management, service assurance, traffic monitoring, analytics, policy control and network security space, assessing various attributes of encryption, its benefits as well as the challenges it poses, specifically loss of visibility that makes networking increasingly complex.

Tara: How important is encryption for today’s applications?

Markus: Given that public internet today is simply not imaginable without proper encryption (98 % of web traffic is encrypted and encrypted communication is the default in modern browsers), it is vital for any application to provide and employ proper encryption technologies. Encryption is necessary to protect the application’s assets and its users.

This also explains the long track record of modern encryption, dating back to the inception of SSL 1.0 in 1994 almost 30 years ago. Approximately 20 years ago, AES was introduced into the standard, which dramatically increased the performance and applicability of the protocols. Today’s standard is already the sixth iteration of standard, which was renamed from SSL to TLS halfway through.

Tara: The evolution of encryption technologies – where are we headed?

Markus: There are basically two trends in encryption nowadays: On the one hand, the amount of data being encrypted is constantly increasing. Traditionally, the actual data payloads were the main target of encryption, because they naturally held the sensitive data to begin with. Now, the definition of sensitive data has expanded to also include things like meta data of encrypted payloads. Consequently, meta data needs to be encrypted as well, thus spawning new technologies and protocols to support said encryption like TLS 1.3 or DoH (DNS over HTTPS). This clearly indicates that we’re headed towards an encrypt-everything society.

The other trend is the advent of quantum computing and the impact it has on current encryption methodologies and algorithms. This jeopardizes the current claim of confidentiality that encryption provides, especially since cryptographic systems are generally reluctant to change and no one can actually predict the evolution speed of quantum computing systems. Current encryption algorithms are vulnerable to quantum decryption techniques like Shor’s algorithm as the quantum approach shifts the problem solving domain from the mathematical, prime factoring domain to the physical domain of creating qbits, thus being able to process all possible states simultaneously instead of sequentially.

However, not all is lost, as there are new or adapted traditional algorithms that cannot be broken by quantum approaches and are therefore dubbed post-quantum or quantum-safe encryption.

Tara: What are some of the benefits of encryption?

Markus: Encryption is an essential part of today’s applications. Any type of modern communication depends on reliable and strong encryption to ensure the integrity and confidentiality of the information being transmitted. Encryption provides the secure envelope for this and should be considered as default modus operandi. You wouldn’t send the information in question by postcard either, would you?

Tara: What are the biggest challenges you see from new encryption technologies such as TLS 1.3?

Markus: Traditionally, middle boxes and technologies such as deep packet inspection (DPI) and application analysis have relied heavily on the meta data of the certificates used in SSL/TLS encrypted connections. With the advent of TLS 1.3, this information is no longer readily available as it is encrypted along with the regular payload, e.g. the SNI (Server Name Identifier) portion of the handshake. Therefore, different technologies are needed to continue to obtain the information required for application management and shaping functionalities. These technologies include, for example, behavioural analysis of packet transport such as size, frequency and timing properties.

Tara: How has encryption impacted network and traffic visibility?

Markus: Network visibility is vital to ensure and optimise the functionality and operation of any network.

This is especially true for financial institutions and other entities that have increased requirements regarding compliance and similar topics. The use of encryption has made all this invisible and inaccessible.

Therefore, the use of application and network proxies has become much more important. The necessary data to resolve the aforementioned tasks can only be obtained by decrypting the packets. On course, this must be done in a very secure and reliable way and requires profound expertise as well as changes to the network architecture, e.g. distribution of internal certificates and chains of trust to enable decryption and encryption at the proxy level.

Tara: How does encrypted traffic impact networking functions such as routing, switching, load balancing, network slicing, etc?

Markus: Fundamental network functions such as routing and switching should hardly be affected. Of course, higher-level functions that depend on additional information, such as application-based routing, suffer from the same drawbacks in terms of visibility. Here, the same measures apply as stated in question 4. The technology needs to evolve further to enable behavioural analysis, for example.

The impact on other functionalities needs be assessed on a case-by-case basis. For example, the impact on load balancing depends heavily on the technology used for the actual balancing. Round-robin methodologies should not be impacted at all, while methodologies that rely on additional data again suffer from the same consequences.

Tara: How does encryption affect network security?

Markus: This is again a two-fold situation. On the one hand, encryption significantly increases security by hiding information that can be used by adversaries to find vulnerabilities in the organisation and exploit them. Furthermore, proper encryption techniques make it almost impossible to inject malicious data into trustworthy information streams.

On the other hand, the same technology can be used by adversaries to hide malware and malicious communications from scanning and detection systems. For example, a virus downloaded through a compromised server may not be detected by a scan engine if the connection is encrypted.

Companies need to take specific measures regarding their network infrastructure to counter this and keep their various security systems like malware scanning, IDS/IPS engine, etc. operational.

Tara: What can be enterprises’ biggest network-related issues with encrypted traffic?

Markus: The loss of visibility described above requires fundamental changes to the network infrastructure to keep services operational and maintain control of the network.

To regain visibility and full scanning potential, encrypted connections must be terminated at dedicated, trustworthy endpoints where traffic can be decrypted, scanned and re-crypted before being forwarded to its final destination.

This presents a challenge for the handling and distribution of the required certificates, especially in BYOD scenarios. Some applications even explicitly protect themselves against these techniques, as from their perspective they are indistinguishable from attacks. In these situations, CISOs and organisations are faced with the tough decision of either blocking the whole application or accepting the inherent dangers of black-box communications. When the choice is to block the application, application management solutions that work with encrypted traffic, e.g. DPI taking behavioural analysis into account, are of course the preferred solution.

Tara: What are some of the ways enterprises can address visibility issues related to encryption?

Markus: Security solution providers are of course very well aware of the problems and challenges that companies face today. They strive to offer well-tailored solutions for the various encryption scenarios.

One valid solution is to use a state-of-the-art next-generation UTM firewall that features behavioural DPI and the necessary forward and backward proxies to enable inspection. A comprehensive overview of the different functions and their impact can be found here: https://www.lancom-systems.com/products/security

Tara: What technologies/techniques can potentially help in delivering visibility into encrypted traffic?

Markus: To sum up the previous questions:

  • Behavioural DPI to regain application visibility
  • Decrypting and re-encrypting proxies to detect threats hidden in encrypted communications
  • Asset management infrastructure to manage and monitor certificate infrastructures
  • Network anomaly detection can help in recognising attacks and finding breaches
  • Employee awareness

This interview is a part of The Fast Mode's Real-time Visibility for Encrypted Traffic segment, featuring 34 leading IP networking solution providers and their views on the impact of encryption on traffic visibility. A research report on this topic will be published in February 2023 - for more information, visit here.

NEW REPORT:
Next-Gen DPI for ZTNA: Advanced Traffic Detection for Real-Time Identity and Context Awareness
Author

Markus Irle is looking back on more than 20 years in the cybersecurity industry, with a focus on encryption, mobile security and network security. Since 2017, he has been responsible for the Next-Generation UTM Firewall unit in Hamburg, Germany, initially as part of Rohde & Schwarz Cybersecurity, and since 2019 as part of LANCOM Systems, a wholly owned subsidiary of Rohde & Schwarz. As LANCOM Systems’ VP Firewall & Security, he engages in quantum-cryptography, deep packet inspection and SASE.

PREVIOUS POST

Enhancing Network Programmability and Automation With Nokia Altiplano for SDAN

NEXT POST

The Future of Edge-Driven Manufacturing