- This topic has 1 voice and 0 replies.
Viewing 0 reply threads
Viewing 0 reply threads
- You must be logged in to reply to this topic.
› Forums › Security › News (Security) › False TCP packets
Tagged: SecureElement_H11, Tips_G9
#News(Security) [ via IoTForIndiaGroup ]
A security policy violation that is all-too-common today involves unauthenticated packets sneaking onto the enterprise LAN. These packets, which can originate from anywhere, are required to establish TCP sessions, over which the desired application-level authentication process can begin. Viewed by analogy, this is like letting someone into your kitchen to determine if they should be allowed in your house. This makes absolutely no sense.
Existing IP-based tools use a combination of rules, heuristics and statistical metrics for decision making. These tools use information which cannot be authenticated, and which often needs continuous updating. The limitation of these tools is that they suffer from both false positives and false negatives, limiting both their deployability and effectiveness. A false positive, by the way, is a false alarm, an indication of a security event when no event exists. A false negative is an undetected attack. It is the false positives that that preclude the automation of these tools for cyber defense.
Each TCP session is individually authenticated with a cryptographic token inserted into the first packet (TCP-SYN) of a TCP session. Our software approach enables deployment in enterprise, cloud, SDN and IIoT infrastructure. It is designed to require no reconfiguration to an existing network, and is easily integrated into a new one.