How you can detect hackers in your encrypted traffic

Decrypting and re-encrypting SSL traffic to find an attack only adds requirements for processing the traffic, which can ultimately clog up the network and application infrastructures. Tools that can decrypt tend to rely on limiting the rate of request, which can drop legitimate traffic, effectively making the attack a success.

Read full news article on The Next Web

 


Date:

Categorie(s):

Tag(s):