As recently announced, Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM). Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause of a breach. However, until now, IT Administrators had been blind to user behavior on their devices. NVM allows you to monitor and analyze this rich data to help you defend against potential security threats like data exfiltration and shadow IT, as well as address network operations challenges like application capacity planning and troubleshooting.
AnyConnect NVM supports the Cisco Network Visibility Flow protocol or nvzFlow for short
(pronounced: en-vizzy-flow). The protocol is designed to provide greater network visibility of endpoints in a lightweight manner by extending standard IPFIX with a small set of high-value endpoint context data. Leading IPFIX vendors have begun implementing the new protocol to provide customers with an unprecedented level of visibility.
Read More »
Tags: Advanced Machine Learning Algorithms, Big Data, Cisco AnyConnect Secure Mobility Client, Cisco Network Visibility Flow Protocol, Cisco Security, cisco technology, ipfix, machine learning, netflow, nvzFlow, security, security research, Standarization
This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka.
Malware is constantly evolving and changing. One way to identify malware is by analyzing the communication that the malware performs on the network. Using machine learning, these traffic patterns can be utilized to identify malicious software. Machine learning faces two obstacles: obtaining a sufficient training set of malicious and normal traffic and retraining the system as malware evolves. This post will analyze an approach that overcomes these obstacles by developing a detector that utilizes domains (easily obtained from domain black lists, security reports, and sandboxing analysis) to train the system which can then be used to analyze more detailed proxy logs using statistical and machine learning techniques.
The network traffic analysis relies on extracting communication patterns from HTTP proxy logs (flows) that are distinctive for malware. Behavioral techniques compute features from the proxy log fields and build a detector that generalizes to the particular malware family exhibiting the targeted behavior.
The statistical features calculated from flows of malware samples are used to train a classifier of malicious traffic. This way, the classifier generalizes the information present in the flows and features and learns to recognize a malware behavior. We use features describing URL structures (such as URL length, decomposition, or character distribution), number of bytes transferred from server to client and vice versa, user agent, HTTP status, MIME type, port, etc. In our experimental evaluation, we used 305 features in total for each flow.
Read More »
Tags: dga, machine learning, Malware Analysis
Reports of the physical retail store’s death have been greatly exaggerated. As a recent survey from the Cisco® Internet Business Solutions Group (IBSG) found, 93 percent of products sold in the United States are still bought in brick-and-mortar locations. And while technology has upended many product categories and more than a few individual retailers, it simultaneously creates opportunities for retailers to continue to make the store shopping experience both relevant and compelling. Big Data in the store is key to achieving this.
Read More »
Tags: Big Data, business intelligence, Cisco, data in motion, IBSG, Internet of Everything, IoE, machine learning, Machine to Machine, machine-to-human, mobility, online shopping, retail, social media, video