What can you learn from encrypted IP traffic without actually decrypting it? Presented by: |
|
What can you learn from encrypted IP traffic without actually decrypting it? There are thousands upon thousands of IP-based application protocols. Many are well-known, such as Facebook, iMessage, Telegram, Signal. Many are obscure custom-built apps. What they all have in common is that they are all encrypted – making it nearly impossible to figure out the communications content without tremendous expense using ZDAs, malware, or other exploits. On the other hand, encrypted or not, every IP packet tells a story. The question is, what can you learn from encrypted IP traffic without actually decrypting it? What can they tell you about the applications? What kind of meta-data can you extract? What can you glean about the end-user identities, devices and locations? This webinar will look at protocol analysis techniques and AI technologies designed to take large scale packet traces and glean actionable intel about the parties and content. Specific topics include:
The speakers will also present a live demo of typical use cases and scenarioes, and save time for Q&A. Presented by: All Contents Copyright © 2020
|