Distributed Denial of Service Detection

Industry Solution
Step #1
Perform training with one or more of the following kinds of machine data. Ingest machine data during times of low activity on your endpoint and high activity on your endpoint, so that the full scope of functionality of your software is captured in training.
  • Application specific logs from /var/log
  • Raw dumps from sniffing at Layers 2-3
  • Raw dumps from /proc of kernel data structures
  • Raw dumps of kernel routing tables
  • General system-wide error messages from /var/log/syslog
Step #2
Periodically upload a new source of machine data and get its prediction report. The new source should contain that same kind of machine data with close similarity in structure and formatting to the machine data ingested in training. At a minimum the new source must contain the deltas of that same kind of machine data ingested in training.
Step #3
Parse the predictions report that's in JSON format for threat notifications.
Get Started
Start your free 30-day trial
Sign up to get started using your free, no contract 30-day trial. Register endpoints, perform training and create reports!
  • Free 30-Day Trial
  • Monthly Subscription: $25/Endpoint
  • No Commitment
  • Includes 50GB Free Storage
  • Additional Storage: $0.3101/GB
  • Get Results Today!
Company Name: