© 2018 SPLUNK INC.© 2018 SPLUNK INC.
Applied Machine Learning in Cybersecurity:
Detect malicious DGA Domains
Data Natives Conference, Berlin
23. November 2018
Philipp Drieger | Staff Machine Learning Architect
© 2018 SPLUNK INC.
During the course of this presentation, we may make forward-looking statements regarding future events or
the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC.
The forward-looking statements made in this presentation are being made as of the time and date of its live
presentation. If reviewed after its live presentation, this presentation may not contain current or accurate
information. We do not assume any obligation to update any forward-looking statements we may make. In
addition, any information about our roadmap outlines our general product direction and is subject to change
at any time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in
the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2018 Splunk Inc. All rights reserved.
Forward-Looking Statements
THIS SLIDE IS REQUIRED FOR ALL 3 PARTY PRESENTATIONS.
© 2018 SPLUNK INC.
Operationalize machine
learning systems with
human in the loop in a big
data environment
End to end real world
example of applied
machine learning in
cybersecurity
Accelerate your data
science workflows and
shrink your research to
production time
Your 3 Key Takeaways
© 2018 SPLUNK INC.
Problem Statement
Section subtitle goes here
© 2018 SPLUNK INC.
Domain Generating Algorithms
▶ Used by malware, e.g. ransomware or
botnets for C&C.
Challenges:
▶ Static matching runs against potentially
infinite blacklist entries O(∞)
▶ Regex can narrow down this list, but still
hard to compute and find rules (and define
exceptions for rules)
▶ Detect unknown unknowns?
Why DGAs matter?
Because personal life and society is directly impacted!
Example IoCs for Wannacry
(https://cert.europa.eu/static/SecurityAdvisories/2017/CERT-
EU-SA2017-012.pdf)
© 2018 SPLUNK INC.
DGA App for Splunk
Free Download:
https://splunkbase.splunk.com/app/3559/
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
Thanks!
Q&A

More Related Content

PDF
DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...
PPTX
DN18 | Demystifying the Buzz in Machine Learning! (This Time for Real) | Dat ...
PDF
DN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLX
PDF
DN18 | From Counting to Connecting: A Networked and Data-Driven Approach to M...
PDF
DN18 | The Data Janitor Returns | Daniel Molnar | Oberlo/Shopify
PDF
Data science for smart manufacturing at Pirelli
PDF
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
PDF
Image Caption Generation: Intro to Distributed Tensorflow and Distributed Sco...
DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...
DN18 | Demystifying the Buzz in Machine Learning! (This Time for Real) | Dat ...
DN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLX
DN18 | From Counting to Connecting: A Networked and Data-Driven Approach to M...
DN18 | The Data Janitor Returns | Daniel Molnar | Oberlo/Shopify
Data science for smart manufacturing at Pirelli
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
Image Caption Generation: Intro to Distributed Tensorflow and Distributed Sco...

What's hot (20)

PDF
Think Big | Enterprise Artificial Intelligence
PPTX
Practical Tips for Interpreting Machine Learning Models - Patrick Hall, H2O.ai
PDF
Webinar - Patient Readmission Risk
DOCX
Resume_10_2019
PDF
Philip Rathle- Graph Boosted Artificial Intelligence
PPTX
Interpretable Machine Learning
PDF
Debugging AI
PPTX
Data Science as a Service: Intersection of Cloud Computing and Data Science
PPTX
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
PPTX
Interpretable machine learning
PPTX
Machine Learning with GraphLab Create
PPTX
So you want to do Data Science.... what now?
PPTX
Emerging engineering issues for building large scale AI systems By Srinivas P...
PDF
Master's degree thesis testing algorithms for image & video understanding
PPTX
Hadoop Projects For Research Scholars
PDF
BigML Release: PCA
PPTX
MATLAB Projects for Computer Science Research Topics
PPTX
EEE Projects Using Matlab Research Assistance
PPTX
Quoc Le at AI Frontiers : Automated Machine Learning
PDF
Fleet intelligence A-Z: Top 10 Terms in Big Data
Think Big | Enterprise Artificial Intelligence
Practical Tips for Interpreting Machine Learning Models - Patrick Hall, H2O.ai
Webinar - Patient Readmission Risk
Resume_10_2019
Philip Rathle- Graph Boosted Artificial Intelligence
Interpretable Machine Learning
Debugging AI
Data Science as a Service: Intersection of Cloud Computing and Data Science
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Interpretable machine learning
Machine Learning with GraphLab Create
So you want to do Data Science.... what now?
Emerging engineering issues for building large scale AI systems By Srinivas P...
Master's degree thesis testing algorithms for image & video understanding
Hadoop Projects For Research Scholars
BigML Release: PCA
MATLAB Projects for Computer Science Research Topics
EEE Projects Using Matlab Research Assistance
Quoc Le at AI Frontiers : Automated Machine Learning
Fleet intelligence A-Z: Top 10 Terms in Big Data
Ad

Similar to DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domains | Philipp Drieger | Splunk (20)

PPTX
Splunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
PDF
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
PPTX
20190123 LSEC CTI - Machine Learning in Infosec
PDF
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp Drieger
PDF
Splunk Artificial Intelligence & Machine Learning Webinar
PPTX
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
PPTX
SplunkLive! Munich 2018: Get More From Your Machine Data Splunk & AI
PDF
Splunk AI & Machine Learning Roundtable 2019 - Zurich
PDF
Get more from your Machine Data with Splunk AI and ML
PDF
Get more from your Machine Date with Splunk AI and ML
PPTX
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
PPTX
SplunkLive! Paris 2018: Splunk And AI 101
PDF
The Power of SPL
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
PDF
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
PPTX
Introduction into Security Analytics Methods
PPTX
Introduction into Security Analytics Methods
PPTX
Get More From Your Data with Splunk AI + ML
PPTX
Splunk .conf18 Updates, Config Add-on, SplDevOps
PDF
Power of SPL Workshop
Splunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
20190123 LSEC CTI - Machine Learning in Infosec
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp Drieger
Splunk Artificial Intelligence & Machine Learning Webinar
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Munich 2018: Get More From Your Machine Data Splunk & AI
Splunk AI & Machine Learning Roundtable 2019 - Zurich
Get more from your Machine Data with Splunk AI and ML
Get more from your Machine Date with Splunk AI and ML
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
SplunkLive! Paris 2018: Splunk And AI 101
The Power of SPL
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
Introduction into Security Analytics Methods
Introduction into Security Analytics Methods
Get More From Your Data with Splunk AI + ML
Splunk .conf18 Updates, Config Add-on, SplDevOps
Power of SPL Workshop
Ad

More from Dataconomy Media (20)

PDF
Data Natives Paris v 10.0 | "Blockchain in Healthcare" - Lea Dias & David An...
PDF
Data Natives Frankfurt v 11.0 | "Competitive advantages with knowledge graphs...
PDF
Data Natives Frankfurt v 11.0 | "Can we be responsible for misuse of data & a...
PDF
Data Natives Munich v 12.0 | "How to be more productive with Autonomous Data ...
PPTX
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
PPTX
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
PPTX
Data Natives Vienna v 7.0 | "Building Kubernetes Operators with KUDO for Dat...
PDF
Data Natives Vienna v 7.0 | "The Ingredients of Data Innovation" - Robbert de...
PPTX
Data Natives Cologne v 4.0 | "The Data Lorax: Planting the Seeds of Fairness...
PDF
Data Natives Cologne v 4.0 | "How People Analytics Can Reveal the Hidden Aspe...
PPTX
Data Natives Amsterdam v 9.0 | "Ten Little Servers: A Story of no Downtime" -...
PDF
Data Natives Amsterdam v 9.0 | "Point in Time Labeling at Scale" - Timothy Th...
PDF
Data Natives Hamburg v 6.0 | "Interpersonal behavior: observing Alex to under...
PDF
Data Natives Hamburg v 6.0 | "About Surfing, Failing & Scaling" - Florian Sch...
PDF
Data NativesBerlin v 20.0 | "Serving A/B experimentation platform end-to-end"...
PPTX
Data Natives Berlin v 20.0 | "Ten Little Servers: A Story of no Downtime" - A...
PDF
Big Data Frankfurt meets Thinkport | "The Cloud as a Driver of Innovation" - ...
PPTX
Thinkport meets Frankfurt | "Financial Time Series Analysis using Wavelets" -...
PPTX
Big Data Helsinki v 3 | "Distributed Machine and Deep Learning at Scale with ...
PPTX
Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...
Data Natives Paris v 10.0 | "Blockchain in Healthcare" - Lea Dias & David An...
Data Natives Frankfurt v 11.0 | "Competitive advantages with knowledge graphs...
Data Natives Frankfurt v 11.0 | "Can we be responsible for misuse of data & a...
Data Natives Munich v 12.0 | "How to be more productive with Autonomous Data ...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Vienna v 7.0 | "Building Kubernetes Operators with KUDO for Dat...
Data Natives Vienna v 7.0 | "The Ingredients of Data Innovation" - Robbert de...
Data Natives Cologne v 4.0 | "The Data Lorax: Planting the Seeds of Fairness...
Data Natives Cologne v 4.0 | "How People Analytics Can Reveal the Hidden Aspe...
Data Natives Amsterdam v 9.0 | "Ten Little Servers: A Story of no Downtime" -...
Data Natives Amsterdam v 9.0 | "Point in Time Labeling at Scale" - Timothy Th...
Data Natives Hamburg v 6.0 | "Interpersonal behavior: observing Alex to under...
Data Natives Hamburg v 6.0 | "About Surfing, Failing & Scaling" - Florian Sch...
Data NativesBerlin v 20.0 | "Serving A/B experimentation platform end-to-end"...
Data Natives Berlin v 20.0 | "Ten Little Servers: A Story of no Downtime" - A...
Big Data Frankfurt meets Thinkport | "The Cloud as a Driver of Innovation" - ...
Thinkport meets Frankfurt | "Financial Time Series Analysis using Wavelets" -...
Big Data Helsinki v 3 | "Distributed Machine and Deep Learning at Scale with ...
Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...

Recently uploaded (20)

PPTX
Pilar Kemerdekaan dan Identi Bangsa.pptx
PPTX
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
PPTX
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
PDF
Introduction to the R Programming Language
PDF
Global Data and Analytics Market Outlook Report
PPTX
SET 1 Compulsory MNH machine learning intro
PPT
statistic analysis for study - data collection
PPTX
Business_Capability_Map_Collection__pptx
PPT
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
PDF
Microsoft Core Cloud Services powerpoint
PPTX
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
PPT
Image processing and pattern recognition 2.ppt
PDF
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
PDF
Transcultural that can help you someday.
PPT
Predictive modeling basics in data cleaning process
PDF
Navigating the Thai Supplements Landscape.pdf
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PPTX
New ISO 27001_2022 standard and the changes
PDF
[EN] Industrial Machine Downtime Prediction
PDF
Data Engineering Interview Questions & Answers Data Modeling (3NF, Star, Vaul...
Pilar Kemerdekaan dan Identi Bangsa.pptx
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
Introduction to the R Programming Language
Global Data and Analytics Market Outlook Report
SET 1 Compulsory MNH machine learning intro
statistic analysis for study - data collection
Business_Capability_Map_Collection__pptx
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
Microsoft Core Cloud Services powerpoint
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
Image processing and pattern recognition 2.ppt
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
Transcultural that can help you someday.
Predictive modeling basics in data cleaning process
Navigating the Thai Supplements Landscape.pdf
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
New ISO 27001_2022 standard and the changes
[EN] Industrial Machine Downtime Prediction
Data Engineering Interview Questions & Answers Data Modeling (3NF, Star, Vaul...

DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domains | Philipp Drieger | Splunk

  • 1. © 2018 SPLUNK INC.© 2018 SPLUNK INC. Applied Machine Learning in Cybersecurity: Detect malicious DGA Domains Data Natives Conference, Berlin 23. November 2018 Philipp Drieger | Staff Machine Learning Architect
  • 2. © 2018 SPLUNK INC. During the course of this presentation, we may make forward-looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward-looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described or to include any such feature or functionality in a future release. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2018 Splunk Inc. All rights reserved. Forward-Looking Statements THIS SLIDE IS REQUIRED FOR ALL 3 PARTY PRESENTATIONS.
  • 3. © 2018 SPLUNK INC. Operationalize machine learning systems with human in the loop in a big data environment End to end real world example of applied machine learning in cybersecurity Accelerate your data science workflows and shrink your research to production time Your 3 Key Takeaways
  • 4. © 2018 SPLUNK INC. Problem Statement Section subtitle goes here
  • 5. © 2018 SPLUNK INC. Domain Generating Algorithms ▶ Used by malware, e.g. ransomware or botnets for C&C. Challenges: ▶ Static matching runs against potentially infinite blacklist entries O(∞) ▶ Regex can narrow down this list, but still hard to compute and find rules (and define exceptions for rules) ▶ Detect unknown unknowns? Why DGAs matter? Because personal life and society is directly impacted! Example IoCs for Wannacry (https://cert.europa.eu/static/SecurityAdvisories/2017/CERT- EU-SA2017-012.pdf)
  • 6. © 2018 SPLUNK INC. DGA App for Splunk Free Download: https://splunkbase.splunk.com/app/3559/
  • 17. © 2018 SPLUNK INC. Thanks! Q&A