SlideShare a Scribd company logo
1 of 86
Download to read offline
1
Using machine learning to
detect DGA with >99.9%
accuracy
Steve Dodson
Tech Lead, Machine Learning
2
This presentation and the accompanying oral presentation contain forward-looking statements, including statements
concerning plans for future offerings; the expected strength, performance or benefits of our offerings; and our future
operations and expected performance. These forward-looking statements are subject to the safe harbor provisions
under the Private Securities Litigation Reform Act of 1995. Our expectations and beliefs in light of currently
available information regarding these matters may not materialize. Actual outcomes and results may differ materially
from those contemplated by these forward-looking statements due to uncertainties, risks, and changes in
circumstances, including, but not limited to those related to: the impact of the COVID-19 pandemic on our business
and our customers and partners; our ability to continue to deliver and improve our offerings and successfully
develop new offerings, including security-related product offerings and SaaS offerings; customer acceptance and
purchase of our existing offerings and new offerings, including the expansion and adoption of our SaaS offerings;
our ability to realize value from investments in the business, including R&D investments; our ability to maintain and
expand our user and customer base; our international expansion strategy; our ability to successfully execute our
go-to-market strategy and expand in our existing markets and into new markets, and our ability to forecast customer
retention and expansion; and general market, political, economic and business conditions.
Additional risks and uncertainties that could cause actual outcomes and results to differ materially are included in
our filings with the Securities and Exchange Commission (the “SEC”), including our Annual Report on Form 10-K for
the most recent fiscal year, our quarterly report on Form 10-Q for the most recent fiscal quarter, and any
subsequent reports filed with the SEC. SEC filings are available on the Investor Relations section of Elastic’s
website at ir.elastic.co and the SEC’s website at www.sec.gov.
Any features or functions of services or products referenced in this presentation, or in any presentations, press
releases or public statements, which are not currently available or not currently available as a general availability
release, may not be delivered on time or at all. The development, release, and timing of any features or functionality
described for our products remains at our sole discretion. Customers who purchase our products and services
should make the purchase decisions based upon services and product features and functions that are currently
available.
All statements are made only as of the date of the presentation, and Elastic assumes no obligation to, and does not
currently intend to, update any forward-looking statements or statements relating to features or functions of services
or products, except as required by law.
Forward-Looking Statements
Overview
• Intro: Domain Generation Algorithms (DGAs)
• Training a supervised model to detect DGA activity
• Deploying a supervised model to detect DGA activity
• Anomaly detection + supervised learning
Domain Generation Algorithms (DGAs)
infected host command and
control (c2)
server
Domain Generation Algorithms (DGAs)
https://www.fortinet.com/blog/threat-research/deep-dive-into-emotet-malware
infected host command and
control (c2)
server
Not DGA  hard coded domains/ip addresses
200.58.171.51:80
200.58.171.51:80
189.196.140.187:80
222.104.222.145:443
115.132.227.247:443
190.85.206.228:80
216.98.148.136:4143
111.67.12.221:8080
185.94.252.27:443
139.59.19.157:80
159.69.211.211:8080
107.159.94.183:8080
...
Domain Generation Algorithms (DGAs)
infected host command and
control (c2)
server
Not DGA  hard coded domains/ip addresses
blocklist
https://www.fortinet.com/blog/threat-research/deep-dive-into-emotet-malware
200.58.171.51:80
189.196.140.187:80
222.104.222.145:443
115.132.227.247:443
190.85.206.228:80
216.98.148.136:4143
111.67.12.221:8080
185.94.252.27:443
139.59.19.157:80
159.69.211.211:8080
107.159.94.183:8080
...
Domain Generation Algorithms (DGAs)
infected host command and
control (c2)
server
Dynamically generated domain names
003zzy.com
103yzy.com
203xzy.com
303wzy.com
403vzy.com
503uzy.com
603tzy.com
703szy.com
803rzy.com
903qzy.com
a03izy.com
b03hzy.com
c03gzy.com
d03fzy.com
e03ezy.com
f03dzy.com
...
Domain Generation Algorithms (DGAs)
infected host command and
control (c2)
server
Dynamically generated domain names
003zzy.com
103yzy.com
203xzy.com
303wzy.com
403vzy.com
503uzy.com
603tzy.com
703szy.com
803rzy.com
903qzy.com
a03izy.com
b03hzy.com
c03gzy.com
d03fzy.com
e03ezy.com
f03dzy.com
...
DNS resolver
103yzy.com
107.183.127.132
107.183.127.132
107.183.127.132
Domain Generation Algorithms (DGAs)
• Domains only need to be registered when needed
• Blocklists become infeasible
– Domains are typically pseudo-random strings seeded by variables such as:
• Time
• Daily trending twitter hashtag
• Insignificant digits of foreign exchange rate
• Weather temperature
– Huge number of potential domains (DGArchive has >100 million domain names)
• Detection via Machine Learning
– Unsupervised clustering e.g. NXDOMAIN responses, domain name trigrams
– Supervised modeling e.g. classification via LSTM, CNN or RNN networks
10
Collect DNS Data
packetbeat
Store
ingest node
data node
Predict DGA
generated
domain name
machine
learning
machine
learning
ml node Identify
anomalous
DGA clients
DGA Detection Using the Elastic Stack
Supervised + Unsupervised Machine Learning
11
Collect DNS Data
packetbeat
ingest
node
Predict DGA
generated
domain name
{
"@timestamp": "2016-04-24T05:27:21.276Z",
"query": "class IN, type A, e5353.g.akamaiedge.net",
"type": "dns",
"client": {
"ip": "172.31.1.6"
},
"dns": {
"type": "answer",
"op_code": "QUERY",
"question": {
"name": "e5353.g.akamaiedge.net",
"type": "A",
"class": "IN",
"etld_plus_one": "akamaiedge.net",
"registered_domain": "akamaiedge.net",
"top_level_domain": "net",
"subdomain": "e5353.g"
},
"response_code": "NOERROR"
},
...
}
{
"@timestamp": "2016-04-24T05:27:21.276Z",
"query": "class IN, type A, e5353.g.akamaiedge.net",
"type": "dns",
"client": {
"ip": "172.31.1.6"
},
"dns": {
"type": "answer",
"op_code": "QUERY",
"question": {
"name": "e5353.g.akamaiedge.net",
"type": "A",
"class": "IN",
"etld_plus_one": "akamaiedge.net",
"registered_domain": "akamaiedge.net",
"top_level_domain": "net",
"subdomain": "e5353.g"
},
"response_code": "NOERROR"
},
"ml_is_dga" : {
"malicious_probability" : 0.000462264881252894,
"malicious_prediction" : 0
},
...
}
DGA Detection Using the Elastic Stack
Create supervised model to predict probability of DGA generated domain name
Malware family Number of examples
tinba 93759
banjori 72443
emotet 52496
gameover 36344
necurs 25487
rovnix 24541
ramnit 19422
qakbot 18693
murofet 16791
simda 10972
pykspa2s 10719
ranbyus 7983
virut 6049
urlzone 6014
dyre 4269
cryptolocker 3236
... ...
• 437554 benign domains (+ DNS responses) based on first
437554 domains in https://tranco-list.eu/list/6WKX/1000000
– tranco attempts to outcome issues with alexa and other
top-n lists
• 437555 malicious domains (+ DNS responses) based on:
– data from
https://data.netlab.360.com/feeds/dga/dga.tx
t retrieved on 2020-07-06
– data generated by scripts based on reverse engineering
malware
– 75 different malware families
– proportions of different malware families follow the rates
of occurence of malware family in threat feeds
DGA Detection Using the Elastic Stack
Step 1 Curate training data
DGA Detection Using the Elastic Stack
...
"dns": {
"question": {
"name": "003zzy.com",
"registered_domain": "003zzy.com",
"top_level_domain": "com"
},
"response_code": "NXDOMAIN"
}
}
...
raw packetbeat
data
Feature Description
0, 0, 3,
z, z, y Unigrams of sld
00, 03,
3z, zz, zy Bigrams of sld
003, 03z,
3zz, zzy Trigrams of sld
com Top level domain
NXDOMAIN DNS response code
select and extract
features
second level domain (sld) == 003zzy
elastic ML automatically
encodes categorical
features
one-hot encoding
target mean encoding
frequency encoding
0.3876153631
0.8477736242
0.175098397
0.5827405692
0.6615046734
0.775009638
0.4144211703
0.900513846
0.8523824824
0.4195915404
0.4521752463
0.115962451
0.7900194414
0.1870883196
0.2410644705
0.7115350244
0.1072127385
0.07823202264
0.4194384261
0.9138066365
0.8286342599
0.4064033259
0.347854925
0.5696505436
0.3060119362
0.4939044746
0.6141223411
0.5219034882
0.303752633
0.2939497085
0.5750901193
0.9182710501
0.168996351
0.02299813442
0.4614626745
0.7587818661
0.4652189072
0.1734316993
0.04630413582
0.8822958048
0.539031397
...
Step 2 Feature engineering
DGA Detection Using the Elastic Stack
Step 3 Train the model
expanded
packetbeat data
create and run data
frame analytics job
{
...
"f": {
"tld": "com",
"b0": "3i",
"b1": "in",
"b2": "n3",
"b3": "3z",
"b4": "zs",
...
},
"dns": {
"question": {
"registered_domain": "3in3zs114mia1dj768i11s67en.com",
"top_level_domain": "com",
"etld_plus_one": "3in3zs114mia1dj768i11s67en.com",
"name": "3in3zs114mia1dj768i11s67en.com",
"type": "A",
"class": "IN"
}
},
"is_malicious": 1,
...
}
• Training details
– 875,109 rows
– 185 categorical features which mapped
to 207 numeric features
– Model training took ~10 hours on gcp
c2-standard-8 8 vCPUs, 32 GB
memory)
– Model training required ~3GB memory
• Model training accuracy
DGA Detection Using the Elastic Stack
Step 4 Evaluate and test the model
0 1
0 437394 161
1 160 437394
0 1
0 99.96 0.04
1 0.04 99.96
• Test data
– 997,301 benign domains (tranco)
– 35,451,973 malicious domains (DGArchive, netlab360 feeds for 20 days)
• Confusion matrix (99.7% accuracy)
DGA Detection Using the Elastic Stack
Step 4 Evaluate and test the model
0 1
0 99.34 0.29
1 0.66 99.71
• Concept drift over time (DGArchive, netlab360
DGA Detection Using the Elastic Stack
Step 4 Evaluate and test the model
malware family true positive rate examples
gozi 0.472789
districtsofficersamount.net
governmentsthemmerciless.cn
circummostdeclare.biz
pandabanker 0.740489
95a4e6473c78.net
5d19cbf688d4.com
28f46950ab54.net
dmsniff 0.914286
albdfhln.com
alcgkown.com
aldjpvqt.com
vawtrak 0.937778
fonizwhgnqp.ru
ajabunorsxu.ru
rktglonmful.ru
proslikefan 0.946852
jsfupqzg.org
udahqhqz.ru
bqbawzavbp.in
pitou 0.955916
koohoavaz.net
nanoeapab.info
roupuadab.mobi
vidro 0.957805
uiaiub.com
unogau.com
vwykzx.com
...
qakbot 0.999132
hluvupofr.net
qxkxqfcipcectpiaiatycab.biz
trrexdawflbxho.net
tinba 0.999191
ghefvfkkxtgg.ru
mqsqytogddne.ru
hosgnecdevwt.ru
ramdo 0.9995
skmymmeiaoooigke.org
ocqiwseygwqyeuma.org
ceigqweqwaywiqgu.org
p2p 0.99978
qguovypzsghmtijhljtsnflnnft.ru
myduodyxtemrcpfproteimzce.com
wsskljhihuamxcqswgkrrwdxk.net
monerodownloader 0.999804
b4e5b238aa543.feedback
0c60f04c2c1b0.org
149be285ab07a.tickets
qadars 0.999837
mvkpybw5i3wx.org
v8l6bshunstq.net
sh238d2fctaf.com
murofet 0.999949
vpevhtorzutawui.info
vpevhtorzutawui.com
gameover 0.999989
1pb98u4egqbcwzes185mpfyvc.com
1phu3tw1xne48hy0s8df17ktgb0.net
gyjcf918ifxjyi07gt011pu5k8.biz
18
ingest
node
Predict DGA
generated
domain name
{
"@timestamp": "2016-04-24T05:27:21.276Z",
"query": "class IN, type A, e5353.g.akamaiedge.net",
"type": "dns",
"client": {
"ip": "172.31.1.6"
},
"dns": {
"type": "answer",
"op_code": "QUERY",
"question": {
"name": "e5353.g.akamaiedge.net",
"type": "A",
"class": "IN",
"etld_plus_one": "akamaiedge.net",
"registered_domain": "akamaiedge.net",
"top_level_domain": "net",
"subdomain": "e5353.g"
},
"response_code": "NOERROR"
},
"ml_is_dga" : {
"malicious_probability" : 0.000462264881252894,
"malicious_prediction" : 0
},
...
}
DGA Detection Using the Elastic Stack
Step 5 Deploy the model
19
Supervised
learning demo
• Combine supervised modeling and unsupervised anomaly detection:
– Supervised model enriches data with probable DGA activity
– Time series anomaly detection can detect clients that have unusual DGA activity
compared to the population
DGA Detection Using the Elastic Stack
Improving accuracy and operationalising DGA detection
21
Anomaly detection +
supervised learning demo
22
Supporting material
https://ela.st/dga
23
Place a quote from someone really, really
important and it will shrink to fit this space.
Lorem ipsum dolor sit amet, consectetur
adipiscing elit, sed do eiusmod tempor
incididunt ut labore et dolore magna aliqua.
Author Name Here
24
Transition Slide
Short and Sweet
25
Transition slide title
Short and sweet
Subtitle lorem ipsum
26
Safe Harbor Statement
This presentation includes forward-looking statements that are
subject to risks and uncertainties. Actual results may differ
materially as a result of various risk factors included in the reports
on the Forms 10K, 10Q, and 8K, and in other filings we make with
the SEC from time to time. Elastic undertakes no obligation to
update any of these forward-looking statements.
27
Thank You!
Bullet title (Inter 24 pt)
• Try to keep your use of bullet slides to a minimum
• Be creative and think visually
• If you need to source something copy and paste the text box at the
bottom left onto your page
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
• Bullets are sentence case (Inter 18pt)
– Second-line bullets are Inter 14pt
• Third-line bullets are Inter 12pt
• Limit the number of bullets on a slide
• Text highlights are orange, but not underlined
• Try not to go below the recommended font sizes
Bullet title (Inter 24 pt)
• Try to keep your use of bullet slides to a minimum
• Be creative and think visually
• If you need to source something copy and paste the text box at the
bottom left onto your page
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
• Bullets are sentence case (Inter 18pt)
‒ Second-line bullets are Inter 14pt
‒ Third-line bullets are Inter 12pt
• Limit the number of bullets on a slide
• Text highlights are orange, but not underlined
• Try not to go below the recommended font sizes
Subtitle sentence case (Inter 18pt)
Place a quote from someone
really, really important and it will
shrink to fit this space…
Author Name Here
Author Name Here
Place a quote from someone
really, really important and it will
shrink to fit this space…
Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Pie Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
62%
Supporting text
goes here under
the number
62%
Supporting text
goes here under
the number
Pie Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title
Short and Sweet
1M 1M 1M
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
Big Number Treatment
1M 1M 1M
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
Big Number Treatment (Dark Mode)
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 1
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 2
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 3
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 4
Please use this area
for content, screen
shot, or quote; the
next few slide show
examples
Please use this area
for content, screen
shot, or quote; the
next few slide show
examples
We mine and analyze
4 billion events every
day to detect security
hacks and threats.
We mine and analyze
4 billion events every
day to detect security
hacks and threats.
Searching for
Rides
55
With organic logging growing 50%
year over year, and monitoring
infrastructure spend at nearly 10%,
one rogue log can ruin the platform.
The checks and balances necessary
to make sure we don’t hit that
roadblock are built with the Elastic
Stack and Beats.
TEXT GOES HERE IN ALL CAPS
Additional text goes here to support the content and can
be a couple lines in length and sits bottom left aligned
56
With organic logging growing 50%
year over year, and monitoring
infrastructure spend at nearly 10%,
one rogue log can ruin the
platform. The checks and balances
necessary to make sure we don’t
hit that roadblock are built with the
Elastic Stack and Beats.
TEXT GOES HERE IN ALL CAPS
Additional text goes here to support the content and can
be a couple lines in length and sits bottom left aligned
”
The Elastic Stack is critical to us. Every day
millions of users and customers worldwide
trust Box to execute mission-critical
business functions.
“
Some text can go here
Some text can go here
You can use
this area for a
text treatment
that supports
your chosen
imagery
You can use
this area for a
text treatment
that supports
your chosen
imagery
Slide Title Here With
a Few Bullets
Subtitle goes here
• Bullet one goes here in
sentence case and no period
• Bullets should be kept short
and sweet; stay focused
• Use bullets to help break up
content that you need to
have on the screen
Slide Title Here With
a Few Bullets
Subtitle goes here
● Bullet one goes here in
sentence case and no
period
● Bullets should be kept short
and sweet; stay focused
● Use bullets to help break up
content that you need to
have on the screen
Slide Title Here
With Key Points
Subtitle goes here
Header Here
Body copy goes here and just increase
the indent level to get to the proper
formatting
Header Here
Body copy goes here and just increase
the indent level to get to the proper
formatting
Header Here
Body copy goes here and just increase
the indent level to get to the proper
formatting
Header Here
Body copy goes here and just increase
LOGGING METRICS APM
ADVANCED
SEARCH
SECURITY
ANALYTICS
DATA
SCIENCE
FOUNDATIONSPECIALIZATIONS
Slide Title Here
With Key Points
Subtitle goes here
Header Here
Body copy goes here and just
increase the indent level to get to
the proper formatting
Header Here
Body copy goes here and just
increase the indent level to get to
the proper formatting
Header Here
Body copy goes here and just
increase the indent level to get to
the proper formatting
Header Here
Body copy goes here and just
Image Treatment With Caption Layout
How to add your own photos and crop properly…
Your image will populate the
container but you will likely need
to adjust the crop. Double click
on the image to adjust. Use the
blue dots to adjust the size.
Click on the grayed out portion
of the image and drag to the
left or right until you are happy
with the crop.
1 2 3Right click on the image and go
to replace image. Select a new
image from your machine.
You can use
this area for a
text treatment
that supports
your chosen
imagery
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case1
Enter title for section three here and use sentence case3
Enter title for section four here and use sentence case4
Enter title for section five here and use sentence case5
Enter title for section two here and use sentence case2
Option 1ANOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case1
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
Enter title for section two here and use sentence case2
Option 1BNOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
3
4
5
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 2NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 3NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 4NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Process Diagram Treatment, 5 Ideas
See style page for more color options
1 2 3 4 5
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas + Highlight
See style page for more color options
1 2 3 4 5
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 4 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 4 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas
See style page for more color options
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
5
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas + Highlight
See style page for more color options
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
1 2 3 4 5
Process Diagram Treatment, 4 Ideas
See style page for more color options
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Title Here Title Here Title Here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Box With Bullet Treatment
Title Here Title Here Title Here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Box With Bullet Treatment with Color Choice
• One bullet here
• Two bullet here
• Three bullet here
Title Here
• One bullet here
• Two bullet here
• Three bullet here
Title Here
• One bullet here
• Two bullet here
• Three bullet here
Title Here
Box Bullet Treatment
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Title Here Title Here Title Here
Box Bullet Treatment with Color Scheme
Thank You
Search. Observe. Protect.

More Related Content

What's hot

Why you should use Elastic for infrastructure metrics
Why you should use Elastic for infrastructure metricsWhy you should use Elastic for infrastructure metrics
Why you should use Elastic for infrastructure metricsElasticsearch
 
Creating stellar customer support experiences using search
Creating stellar customer support experiences using searchCreating stellar customer support experiences using search
Creating stellar customer support experiences using searchElasticsearch
 
Breaking silos between DevOps and SecOps with Elastic
Breaking silos between DevOps and SecOps with ElasticBreaking silos between DevOps and SecOps with Elastic
Breaking silos between DevOps and SecOps with ElasticElasticsearch
 
Observability with Elastic at Audi Business Innovation
Observability with Elastic at Audi Business InnovationObservability with Elastic at Audi Business Innovation
Observability with Elastic at Audi Business InnovationElasticsearch
 
Searching anything, anywhere with Workplace Search
Searching anything, anywhere with Workplace SearchSearching anything, anywhere with Workplace Search
Searching anything, anywhere with Workplace SearchElasticsearch
 
Protecting against cyber attacks at UC Davis with Elastic
Protecting against cyber attacks at UC Davis with ElasticProtecting against cyber attacks at UC Davis with Elastic
Protecting against cyber attacks at UC Davis with ElasticElasticsearch
 
What's new at Elastic: Update on major initiatives and releases
What's new at Elastic: Update on major initiatives and releasesWhat's new at Elastic: Update on major initiatives and releases
What's new at Elastic: Update on major initiatives and releasesElasticsearch
 
Forever free and open Enterprise Search
Forever free and open Enterprise SearchForever free and open Enterprise Search
Forever free and open Enterprise SearchElasticsearch
 
Using a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityUsing a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityElasticsearch
 
Deliver great user experiences with RUM and synthetic monitoring
Deliver great user experiences with RUM and synthetic monitoringDeliver great user experiences with RUM and synthetic monitoring
Deliver great user experiences with RUM and synthetic monitoringElasticsearch
 
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...WSO2
 
Accredcamp
AccredcampAccredcamp
AccredcampG-Cloud
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 

What's hot (14)

Why you should use Elastic for infrastructure metrics
Why you should use Elastic for infrastructure metricsWhy you should use Elastic for infrastructure metrics
Why you should use Elastic for infrastructure metrics
 
Creating stellar customer support experiences using search
Creating stellar customer support experiences using searchCreating stellar customer support experiences using search
Creating stellar customer support experiences using search
 
Breaking silos between DevOps and SecOps with Elastic
Breaking silos between DevOps and SecOps with ElasticBreaking silos between DevOps and SecOps with Elastic
Breaking silos between DevOps and SecOps with Elastic
 
Observability with Elastic at Audi Business Innovation
Observability with Elastic at Audi Business InnovationObservability with Elastic at Audi Business Innovation
Observability with Elastic at Audi Business Innovation
 
Searching anything, anywhere with Workplace Search
Searching anything, anywhere with Workplace SearchSearching anything, anywhere with Workplace Search
Searching anything, anywhere with Workplace Search
 
Protecting against cyber attacks at UC Davis with Elastic
Protecting against cyber attacks at UC Davis with ElasticProtecting against cyber attacks at UC Davis with Elastic
Protecting against cyber attacks at UC Davis with Elastic
 
What's new at Elastic: Update on major initiatives and releases
What's new at Elastic: Update on major initiatives and releasesWhat's new at Elastic: Update on major initiatives and releases
What's new at Elastic: Update on major initiatives and releases
 
Forever free and open Enterprise Search
Forever free and open Enterprise SearchForever free and open Enterprise Search
Forever free and open Enterprise Search
 
Using a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityUsing a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective security
 
Deliver great user experiences with RUM and synthetic monitoring
Deliver great user experiences with RUM and synthetic monitoringDeliver great user experiences with RUM and synthetic monitoring
Deliver great user experiences with RUM and synthetic monitoring
 
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
 
2018 highlights-q1
2018 highlights-q12018 highlights-q1
2018 highlights-q1
 
Accredcamp
AccredcampAccredcamp
Accredcamp
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 

Similar to Using machine learning to detect DGA with >99.9% accuracy

Hdcs Overview Final
Hdcs Overview FinalHdcs Overview Final
Hdcs Overview Finalrjt01
 
Developing Offline Mobile Apps with Salesforce Mobile SDK SmartStore
Developing Offline Mobile Apps with Salesforce Mobile SDK SmartStoreDeveloping Offline Mobile Apps with Salesforce Mobile SDK SmartStore
Developing Offline Mobile Apps with Salesforce Mobile SDK SmartStoreTom Gersic
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaSftculotta27
 
ApexUnit: Open source test framework for apex
ApexUnit: Open source test framework for apexApexUnit: Open source test framework for apex
ApexUnit: Open source test framework for apexVamshidhar Gandham
 
Javascript Security and Lightning Locker Service
Javascript Security and Lightning Locker ServiceJavascript Security and Lightning Locker Service
Javascript Security and Lightning Locker ServiceSalesforce Developers
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationInvestorSymantec
 
Introduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKIntroduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKSalesforce Developers
 
Visualizing Your Business Data... in Minecraft!
Visualizing Your Business Data... in Minecraft!Visualizing Your Business Data... in Minecraft!
Visualizing Your Business Data... in Minecraft!Salesforce Developers
 
Monitor your car from the cloud! DIY Telematics and the Internet of Things
Monitor your car from the cloud! DIY Telematics and the Internet of ThingsMonitor your car from the cloud! DIY Telematics and the Internet of Things
Monitor your car from the cloud! DIY Telematics and the Internet of ThingsTom Gersic
 
IoTで成功を収めるための製品と戦略 〜 Salesforce IoT 〜
IoTで成功を収めるための製品と戦略 〜 Salesforce IoT 〜IoTで成功を収めるための製品と戦略 〜 Salesforce IoT 〜
IoTで成功を収めるための製品と戦略 〜 Salesforce IoT 〜Salesforce Developers Japan
 
Elastic Security under the hood
Elastic Security under the hoodElastic Security under the hood
Elastic Security under the hoodElasticsearch
 
Hca advanced developer workshop
Hca advanced developer workshopHca advanced developer workshop
Hca advanced developer workshopDavid Scruggs
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoringElasticsearch
 
TrailheaDX 2019 : Explore New Frontiers with High Volume Platform Events
TrailheaDX 2019 :  Explore New Frontiers with High Volume Platform EventsTrailheaDX 2019 :  Explore New Frontiers with High Volume Platform Events
TrailheaDX 2019 : Explore New Frontiers with High Volume Platform EventsJohn Brock
 
See Androids Fighting: Connect Salesforce with Your Android Wear Watch
See Androids Fighting: Connect Salesforce with Your Android Wear WatchSee Androids Fighting: Connect Salesforce with Your Android Wear Watch
See Androids Fighting: Connect Salesforce with Your Android Wear WatchSalesforce Developers
 
Salesforce DX with Visual Studio Code
Salesforce DX with Visual Studio CodeSalesforce DX with Visual Studio Code
Salesforce DX with Visual Studio CodeThierry TROUIN ☁
 

Similar to Using machine learning to detect DGA with >99.9% accuracy (20)

Hdcs Overview Final
Hdcs Overview FinalHdcs Overview Final
Hdcs Overview Final
 
Developing Offline Mobile Apps with Salesforce Mobile SDK SmartStore
Developing Offline Mobile Apps with Salesforce Mobile SDK SmartStoreDeveloping Offline Mobile Apps with Salesforce Mobile SDK SmartStore
Developing Offline Mobile Apps with Salesforce Mobile SDK SmartStore
 
Introduction to Heroku
Introduction to HerokuIntroduction to Heroku
Introduction to Heroku
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
ApexUnit: Open source test framework for apex
ApexUnit: Open source test framework for apexApexUnit: Open source test framework for apex
ApexUnit: Open source test framework for apex
 
Javascript Security and Lightning Locker Service
Javascript Security and Lightning Locker ServiceJavascript Security and Lightning Locker Service
Javascript Security and Lightning Locker Service
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 
Introduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKIntroduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDK
 
Visualizing Your Business Data... in Minecraft!
Visualizing Your Business Data... in Minecraft!Visualizing Your Business Data... in Minecraft!
Visualizing Your Business Data... in Minecraft!
 
Salesforce platform session 2
 Salesforce platform session 2 Salesforce platform session 2
Salesforce platform session 2
 
Monitor your car from the cloud! DIY Telematics and the Internet of Things
Monitor your car from the cloud! DIY Telematics and the Internet of ThingsMonitor your car from the cloud! DIY Telematics and the Internet of Things
Monitor your car from the cloud! DIY Telematics and the Internet of Things
 
IoTで成功を収めるための製品と戦略 〜 Salesforce IoT 〜
IoTで成功を収めるための製品と戦略 〜 Salesforce IoT 〜IoTで成功を収めるための製品と戦略 〜 Salesforce IoT 〜
IoTで成功を収めるための製品と戦略 〜 Salesforce IoT 〜
 
Elastic Security under the hood
Elastic Security under the hoodElastic Security under the hood
Elastic Security under the hood
 
Introduction to Heroku Postgres
Introduction to Heroku PostgresIntroduction to Heroku Postgres
Introduction to Heroku Postgres
 
Hca advanced developer workshop
Hca advanced developer workshopHca advanced developer workshop
Hca advanced developer workshop
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoring
 
TrailheaDX 2019 : Explore New Frontiers with High Volume Platform Events
TrailheaDX 2019 :  Explore New Frontiers with High Volume Platform EventsTrailheaDX 2019 :  Explore New Frontiers with High Volume Platform Events
TrailheaDX 2019 : Explore New Frontiers with High Volume Platform Events
 
See Androids Fighting: Connect Salesforce with Your Android Wear Watch
See Androids Fighting: Connect Salesforce with Your Android Wear WatchSee Androids Fighting: Connect Salesforce with Your Android Wear Watch
See Androids Fighting: Connect Salesforce with Your Android Wear Watch
 
Winter '22 highlights
Winter '22 highlightsWinter '22 highlights
Winter '22 highlights
 
Salesforce DX with Visual Studio Code
Salesforce DX with Visual Studio CodeSalesforce DX with Visual Studio Code
Salesforce DX with Visual Studio Code
 

More from Elasticsearch

An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxElasticsearch
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using ElasticElasticsearch
 
Cómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webCómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webElasticsearch
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Elasticsearch
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudElasticsearch
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesElasticsearch
 
Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Elasticsearch
 
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Elasticsearch
 
An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxElasticsearch
 
Welcome to a new state of find
Welcome to a new state of findWelcome to a new state of find
Welcome to a new state of findElasticsearch
 
Building great website search experiences
Building great website search experiencesBuilding great website search experiences
Building great website search experiencesElasticsearch
 
Keynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchKeynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchElasticsearch
 
Cómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesCómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesElasticsearch
 
Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Elasticsearch
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesElasticsearch
 
Transforming data into actionable insights
Transforming data into actionable insightsTransforming data into actionable insights
Transforming data into actionable insightsElasticsearch
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Elasticsearch
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentElasticsearch
 
The opportunities and challenges of data for public good
The opportunities and challenges of data for public goodThe opportunities and challenges of data for public good
The opportunities and challenges of data for public goodElasticsearch
 
Enterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticEnterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticElasticsearch
 

More from Elasticsearch (20)

An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using Elastic
 
Cómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webCómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios web
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
 
Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.
 
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
 
An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
 
Welcome to a new state of find
Welcome to a new state of findWelcome to a new state of find
Welcome to a new state of find
 
Building great website search experiences
Building great website search experiencesBuilding great website search experiences
Building great website search experiences
 
Keynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchKeynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified search
 
Cómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesCómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisiones
 
Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
 
Transforming data into actionable insights
Transforming data into actionable insightsTransforming data into actionable insights
Transforming data into actionable insights
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
 
The opportunities and challenges of data for public good
The opportunities and challenges of data for public goodThe opportunities and challenges of data for public good
The opportunities and challenges of data for public good
 
Enterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticEnterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and Elastic
 

Recently uploaded

Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 

Recently uploaded (20)

Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Using machine learning to detect DGA with >99.9% accuracy

  • 1. 1 Using machine learning to detect DGA with >99.9% accuracy Steve Dodson Tech Lead, Machine Learning
  • 2. 2 This presentation and the accompanying oral presentation contain forward-looking statements, including statements concerning plans for future offerings; the expected strength, performance or benefits of our offerings; and our future operations and expected performance. These forward-looking statements are subject to the safe harbor provisions under the Private Securities Litigation Reform Act of 1995. Our expectations and beliefs in light of currently available information regarding these matters may not materialize. Actual outcomes and results may differ materially from those contemplated by these forward-looking statements due to uncertainties, risks, and changes in circumstances, including, but not limited to those related to: the impact of the COVID-19 pandemic on our business and our customers and partners; our ability to continue to deliver and improve our offerings and successfully develop new offerings, including security-related product offerings and SaaS offerings; customer acceptance and purchase of our existing offerings and new offerings, including the expansion and adoption of our SaaS offerings; our ability to realize value from investments in the business, including R&D investments; our ability to maintain and expand our user and customer base; our international expansion strategy; our ability to successfully execute our go-to-market strategy and expand in our existing markets and into new markets, and our ability to forecast customer retention and expansion; and general market, political, economic and business conditions. Additional risks and uncertainties that could cause actual outcomes and results to differ materially are included in our filings with the Securities and Exchange Commission (the “SEC”), including our Annual Report on Form 10-K for the most recent fiscal year, our quarterly report on Form 10-Q for the most recent fiscal quarter, and any subsequent reports filed with the SEC. SEC filings are available on the Investor Relations section of Elastic’s website at ir.elastic.co and the SEC’s website at www.sec.gov. Any features or functions of services or products referenced in this presentation, or in any presentations, press releases or public statements, which are not currently available or not currently available as a general availability release, may not be delivered on time or at all. The development, release, and timing of any features or functionality described for our products remains at our sole discretion. Customers who purchase our products and services should make the purchase decisions based upon services and product features and functions that are currently available. All statements are made only as of the date of the presentation, and Elastic assumes no obligation to, and does not currently intend to, update any forward-looking statements or statements relating to features or functions of services or products, except as required by law. Forward-Looking Statements
  • 3. Overview • Intro: Domain Generation Algorithms (DGAs) • Training a supervised model to detect DGA activity • Deploying a supervised model to detect DGA activity • Anomaly detection + supervised learning
  • 4. Domain Generation Algorithms (DGAs) infected host command and control (c2) server
  • 5. Domain Generation Algorithms (DGAs) https://www.fortinet.com/blog/threat-research/deep-dive-into-emotet-malware infected host command and control (c2) server Not DGA  hard coded domains/ip addresses 200.58.171.51:80 200.58.171.51:80 189.196.140.187:80 222.104.222.145:443 115.132.227.247:443 190.85.206.228:80 216.98.148.136:4143 111.67.12.221:8080 185.94.252.27:443 139.59.19.157:80 159.69.211.211:8080 107.159.94.183:8080 ...
  • 6. Domain Generation Algorithms (DGAs) infected host command and control (c2) server Not DGA  hard coded domains/ip addresses blocklist https://www.fortinet.com/blog/threat-research/deep-dive-into-emotet-malware 200.58.171.51:80 189.196.140.187:80 222.104.222.145:443 115.132.227.247:443 190.85.206.228:80 216.98.148.136:4143 111.67.12.221:8080 185.94.252.27:443 139.59.19.157:80 159.69.211.211:8080 107.159.94.183:8080 ...
  • 7. Domain Generation Algorithms (DGAs) infected host command and control (c2) server Dynamically generated domain names 003zzy.com 103yzy.com 203xzy.com 303wzy.com 403vzy.com 503uzy.com 603tzy.com 703szy.com 803rzy.com 903qzy.com a03izy.com b03hzy.com c03gzy.com d03fzy.com e03ezy.com f03dzy.com ...
  • 8. Domain Generation Algorithms (DGAs) infected host command and control (c2) server Dynamically generated domain names 003zzy.com 103yzy.com 203xzy.com 303wzy.com 403vzy.com 503uzy.com 603tzy.com 703szy.com 803rzy.com 903qzy.com a03izy.com b03hzy.com c03gzy.com d03fzy.com e03ezy.com f03dzy.com ... DNS resolver 103yzy.com 107.183.127.132 107.183.127.132 107.183.127.132
  • 9. Domain Generation Algorithms (DGAs) • Domains only need to be registered when needed • Blocklists become infeasible – Domains are typically pseudo-random strings seeded by variables such as: • Time • Daily trending twitter hashtag • Insignificant digits of foreign exchange rate • Weather temperature – Huge number of potential domains (DGArchive has >100 million domain names) • Detection via Machine Learning – Unsupervised clustering e.g. NXDOMAIN responses, domain name trigrams – Supervised modeling e.g. classification via LSTM, CNN or RNN networks
  • 10. 10 Collect DNS Data packetbeat Store ingest node data node Predict DGA generated domain name machine learning machine learning ml node Identify anomalous DGA clients DGA Detection Using the Elastic Stack Supervised + Unsupervised Machine Learning
  • 11. 11 Collect DNS Data packetbeat ingest node Predict DGA generated domain name { "@timestamp": "2016-04-24T05:27:21.276Z", "query": "class IN, type A, e5353.g.akamaiedge.net", "type": "dns", "client": { "ip": "172.31.1.6" }, "dns": { "type": "answer", "op_code": "QUERY", "question": { "name": "e5353.g.akamaiedge.net", "type": "A", "class": "IN", "etld_plus_one": "akamaiedge.net", "registered_domain": "akamaiedge.net", "top_level_domain": "net", "subdomain": "e5353.g" }, "response_code": "NOERROR" }, ... } { "@timestamp": "2016-04-24T05:27:21.276Z", "query": "class IN, type A, e5353.g.akamaiedge.net", "type": "dns", "client": { "ip": "172.31.1.6" }, "dns": { "type": "answer", "op_code": "QUERY", "question": { "name": "e5353.g.akamaiedge.net", "type": "A", "class": "IN", "etld_plus_one": "akamaiedge.net", "registered_domain": "akamaiedge.net", "top_level_domain": "net", "subdomain": "e5353.g" }, "response_code": "NOERROR" }, "ml_is_dga" : { "malicious_probability" : 0.000462264881252894, "malicious_prediction" : 0 }, ... } DGA Detection Using the Elastic Stack Create supervised model to predict probability of DGA generated domain name
  • 12. Malware family Number of examples tinba 93759 banjori 72443 emotet 52496 gameover 36344 necurs 25487 rovnix 24541 ramnit 19422 qakbot 18693 murofet 16791 simda 10972 pykspa2s 10719 ranbyus 7983 virut 6049 urlzone 6014 dyre 4269 cryptolocker 3236 ... ... • 437554 benign domains (+ DNS responses) based on first 437554 domains in https://tranco-list.eu/list/6WKX/1000000 – tranco attempts to outcome issues with alexa and other top-n lists • 437555 malicious domains (+ DNS responses) based on: – data from https://data.netlab.360.com/feeds/dga/dga.tx t retrieved on 2020-07-06 – data generated by scripts based on reverse engineering malware – 75 different malware families – proportions of different malware families follow the rates of occurence of malware family in threat feeds DGA Detection Using the Elastic Stack Step 1 Curate training data
  • 13. DGA Detection Using the Elastic Stack ... "dns": { "question": { "name": "003zzy.com", "registered_domain": "003zzy.com", "top_level_domain": "com" }, "response_code": "NXDOMAIN" } } ... raw packetbeat data Feature Description 0, 0, 3, z, z, y Unigrams of sld 00, 03, 3z, zz, zy Bigrams of sld 003, 03z, 3zz, zzy Trigrams of sld com Top level domain NXDOMAIN DNS response code select and extract features second level domain (sld) == 003zzy elastic ML automatically encodes categorical features one-hot encoding target mean encoding frequency encoding 0.3876153631 0.8477736242 0.175098397 0.5827405692 0.6615046734 0.775009638 0.4144211703 0.900513846 0.8523824824 0.4195915404 0.4521752463 0.115962451 0.7900194414 0.1870883196 0.2410644705 0.7115350244 0.1072127385 0.07823202264 0.4194384261 0.9138066365 0.8286342599 0.4064033259 0.347854925 0.5696505436 0.3060119362 0.4939044746 0.6141223411 0.5219034882 0.303752633 0.2939497085 0.5750901193 0.9182710501 0.168996351 0.02299813442 0.4614626745 0.7587818661 0.4652189072 0.1734316993 0.04630413582 0.8822958048 0.539031397 ... Step 2 Feature engineering
  • 14. DGA Detection Using the Elastic Stack Step 3 Train the model expanded packetbeat data create and run data frame analytics job { ... "f": { "tld": "com", "b0": "3i", "b1": "in", "b2": "n3", "b3": "3z", "b4": "zs", ... }, "dns": { "question": { "registered_domain": "3in3zs114mia1dj768i11s67en.com", "top_level_domain": "com", "etld_plus_one": "3in3zs114mia1dj768i11s67en.com", "name": "3in3zs114mia1dj768i11s67en.com", "type": "A", "class": "IN" } }, "is_malicious": 1, ... }
  • 15. • Training details – 875,109 rows – 185 categorical features which mapped to 207 numeric features – Model training took ~10 hours on gcp c2-standard-8 8 vCPUs, 32 GB memory) – Model training required ~3GB memory • Model training accuracy DGA Detection Using the Elastic Stack Step 4 Evaluate and test the model 0 1 0 437394 161 1 160 437394 0 1 0 99.96 0.04 1 0.04 99.96
  • 16. • Test data – 997,301 benign domains (tranco) – 35,451,973 malicious domains (DGArchive, netlab360 feeds for 20 days) • Confusion matrix (99.7% accuracy) DGA Detection Using the Elastic Stack Step 4 Evaluate and test the model 0 1 0 99.34 0.29 1 0.66 99.71
  • 17. • Concept drift over time (DGArchive, netlab360 DGA Detection Using the Elastic Stack Step 4 Evaluate and test the model malware family true positive rate examples gozi 0.472789 districtsofficersamount.net governmentsthemmerciless.cn circummostdeclare.biz pandabanker 0.740489 95a4e6473c78.net 5d19cbf688d4.com 28f46950ab54.net dmsniff 0.914286 albdfhln.com alcgkown.com aldjpvqt.com vawtrak 0.937778 fonizwhgnqp.ru ajabunorsxu.ru rktglonmful.ru proslikefan 0.946852 jsfupqzg.org udahqhqz.ru bqbawzavbp.in pitou 0.955916 koohoavaz.net nanoeapab.info roupuadab.mobi vidro 0.957805 uiaiub.com unogau.com vwykzx.com ... qakbot 0.999132 hluvupofr.net qxkxqfcipcectpiaiatycab.biz trrexdawflbxho.net tinba 0.999191 ghefvfkkxtgg.ru mqsqytogddne.ru hosgnecdevwt.ru ramdo 0.9995 skmymmeiaoooigke.org ocqiwseygwqyeuma.org ceigqweqwaywiqgu.org p2p 0.99978 qguovypzsghmtijhljtsnflnnft.ru myduodyxtemrcpfproteimzce.com wsskljhihuamxcqswgkrrwdxk.net monerodownloader 0.999804 b4e5b238aa543.feedback 0c60f04c2c1b0.org 149be285ab07a.tickets qadars 0.999837 mvkpybw5i3wx.org v8l6bshunstq.net sh238d2fctaf.com murofet 0.999949 vpevhtorzutawui.info vpevhtorzutawui.com gameover 0.999989 1pb98u4egqbcwzes185mpfyvc.com 1phu3tw1xne48hy0s8df17ktgb0.net gyjcf918ifxjyi07gt011pu5k8.biz
  • 18. 18 ingest node Predict DGA generated domain name { "@timestamp": "2016-04-24T05:27:21.276Z", "query": "class IN, type A, e5353.g.akamaiedge.net", "type": "dns", "client": { "ip": "172.31.1.6" }, "dns": { "type": "answer", "op_code": "QUERY", "question": { "name": "e5353.g.akamaiedge.net", "type": "A", "class": "IN", "etld_plus_one": "akamaiedge.net", "registered_domain": "akamaiedge.net", "top_level_domain": "net", "subdomain": "e5353.g" }, "response_code": "NOERROR" }, "ml_is_dga" : { "malicious_probability" : 0.000462264881252894, "malicious_prediction" : 0 }, ... } DGA Detection Using the Elastic Stack Step 5 Deploy the model
  • 20. • Combine supervised modeling and unsupervised anomaly detection: – Supervised model enriches data with probable DGA activity – Time series anomaly detection can detect clients that have unusual DGA activity compared to the population DGA Detection Using the Elastic Stack Improving accuracy and operationalising DGA detection
  • 23. 23 Place a quote from someone really, really important and it will shrink to fit this space. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Author Name Here
  • 25. 25 Transition slide title Short and sweet Subtitle lorem ipsum
  • 26. 26 Safe Harbor Statement This presentation includes forward-looking statements that are subject to risks and uncertainties. Actual results may differ materially as a result of various risk factors included in the reports on the Forms 10K, 10Q, and 8K, and in other filings we make with the SEC from time to time. Elastic undertakes no obligation to update any of these forward-looking statements.
  • 28. Bullet title (Inter 24 pt) • Try to keep your use of bullet slides to a minimum • Be creative and think visually • If you need to source something copy and paste the text box at the bottom left onto your page Subtitle sentence case (Inter 18pt)
  • 29. Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) Subtitle sentence case (Inter 18pt) Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) • Bullets are sentence case (Inter 18pt) – Second-line bullets are Inter 14pt • Third-line bullets are Inter 12pt • Limit the number of bullets on a slide • Text highlights are orange, but not underlined • Try not to go below the recommended font sizes
  • 30. Bullet title (Inter 24 pt) • Try to keep your use of bullet slides to a minimum • Be creative and think visually • If you need to source something copy and paste the text box at the bottom left onto your page Subtitle sentence case (Inter 18pt)
  • 31. Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) • Bullets are sentence case (Inter 18pt) ‒ Second-line bullets are Inter 14pt ‒ Third-line bullets are Inter 12pt • Limit the number of bullets on a slide • Text highlights are orange, but not underlined • Try not to go below the recommended font sizes Subtitle sentence case (Inter 18pt)
  • 32. Place a quote from someone really, really important and it will shrink to fit this space… Author Name Here
  • 33. Author Name Here Place a quote from someone really, really important and it will shrink to fit this space…
  • 34. Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 35. Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 36. Pie Chart Slide With Multiple Colors Sub-title or chart title here in sentence case 62% Supporting text goes here under the number 62% Supporting text goes here under the number
  • 37. Pie Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 38. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 39. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 40. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 42. 1M 1M 1M HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number Big Number Treatment
  • 43. 1M 1M 1M HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number Big Number Treatment (Dark Mode)
  • 44. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 1
  • 45. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 2
  • 46. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 3
  • 47. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 4
  • 48.
  • 49. Please use this area for content, screen shot, or quote; the next few slide show examples
  • 50. Please use this area for content, screen shot, or quote; the next few slide show examples
  • 51. We mine and analyze 4 billion events every day to detect security hacks and threats.
  • 52. We mine and analyze 4 billion events every day to detect security hacks and threats.
  • 53.
  • 55. 55 With organic logging growing 50% year over year, and monitoring infrastructure spend at nearly 10%, one rogue log can ruin the platform. The checks and balances necessary to make sure we don’t hit that roadblock are built with the Elastic Stack and Beats. TEXT GOES HERE IN ALL CAPS Additional text goes here to support the content and can be a couple lines in length and sits bottom left aligned
  • 56. 56 With organic logging growing 50% year over year, and monitoring infrastructure spend at nearly 10%, one rogue log can ruin the platform. The checks and balances necessary to make sure we don’t hit that roadblock are built with the Elastic Stack and Beats. TEXT GOES HERE IN ALL CAPS Additional text goes here to support the content and can be a couple lines in length and sits bottom left aligned
  • 57. ” The Elastic Stack is critical to us. Every day millions of users and customers worldwide trust Box to execute mission-critical business functions. “
  • 58. Some text can go here Some text can go here
  • 59. You can use this area for a text treatment that supports your chosen imagery
  • 60. You can use this area for a text treatment that supports your chosen imagery
  • 61. Slide Title Here With a Few Bullets Subtitle goes here • Bullet one goes here in sentence case and no period • Bullets should be kept short and sweet; stay focused • Use bullets to help break up content that you need to have on the screen
  • 62. Slide Title Here With a Few Bullets Subtitle goes here ● Bullet one goes here in sentence case and no period ● Bullets should be kept short and sweet; stay focused ● Use bullets to help break up content that you need to have on the screen
  • 63. Slide Title Here With Key Points Subtitle goes here Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase LOGGING METRICS APM ADVANCED SEARCH SECURITY ANALYTICS DATA SCIENCE FOUNDATIONSPECIALIZATIONS
  • 64. Slide Title Here With Key Points Subtitle goes here Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just
  • 65. Image Treatment With Caption Layout How to add your own photos and crop properly… Your image will populate the container but you will likely need to adjust the crop. Double click on the image to adjust. Use the blue dots to adjust the size. Click on the grayed out portion of the image and drag to the left or right until you are happy with the crop. 1 2 3Right click on the image and go to replace image. Select a new image from your machine.
  • 66. You can use this area for a text treatment that supports your chosen imagery
  • 67. Agenda Slide Use color to highlight Enter title for section one here and use sentence case1 Enter title for section three here and use sentence case3 Enter title for section four here and use sentence case4 Enter title for section five here and use sentence case5 Enter title for section two here and use sentence case2 Option 1ANOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 68. Agenda Slide Use color to highlight Enter title for section one here and use sentence case1 Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case Enter title for section two here and use sentence case2 Option 1BNOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE. 3 4 5
  • 69. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 2NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 70. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 3NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 71. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 4NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 72. Process Diagram Treatment, 5 Ideas See style page for more color options 1 2 3 4 5 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 73. Process Diagram Treatment, 5 Ideas + Highlight See style page for more color options 1 2 3 4 5 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 74. Process Diagram Treatment, 4 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 75. Process Diagram Treatment, 4 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 76. Process Diagram Treatment, 3 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 Supporting text goes here under the number Supporting text goes here under the number
  • 77. Process Diagram Treatment, 3 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 Supporting text goes here under the number Supporting text goes here under the number
  • 78. Process Diagram Treatment, 5 Ideas See style page for more color options 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number 5 Supporting text goes here under the number
  • 79. Process Diagram Treatment, 5 Ideas + Highlight See style page for more color options Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number 1 2 3 4 5
  • 80. Process Diagram Treatment, 4 Ideas See style page for more color options 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 81. Process Diagram Treatment, 3 Ideas See style page for more color options 1 2 3 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 82. Title Here Title Here Title Here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Box With Bullet Treatment
  • 83. Title Here Title Here Title Here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Box With Bullet Treatment with Color Choice
  • 84. • One bullet here • Two bullet here • Three bullet here Title Here • One bullet here • Two bullet here • Three bullet here Title Here • One bullet here • Two bullet here • Three bullet here Title Here Box Bullet Treatment
  • 85. • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Title Here Title Here Title Here Box Bullet Treatment with Color Scheme