{"id":2348,"date":"2017-09-18T21:20:35","date_gmt":"2017-09-18T21:20:35","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2348"},"modified":"2020-05-06T10:27:57","modified_gmt":"2020-05-06T17:27:57","slug":"how-behavioral-analytics-can-help-detect-0-day-threats","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/","title":{"rendered":"How Behavioral Analytics can Help Detect 0-Day Threats"},"content":{"rendered":"<h3 id=\"toc-hId-1154198740\">Going Beyond Reputation and Signature-Based Detection Algorithms<\/h3>\n<p>Cyber attacks are getting increasingly sophisticated. Most current\u00a0security algorithms are designed to detect these attacks using the previous malware and malicious domains history. \u00a0Such algorithms are at a loss when it comes to detecting new threats that don&#8217;t have any history. A new way is emerging to detect such threats using machine learning and artificial intelligence (AI).<\/p>\n<p>We asked our experts, Srikrupa (Krupa) Srivatsan, Sr Product Marketing Manager and Philip Qian, Sr. Product Manager of Infoblox to give us more information on how behavioral analytics can help in this regard. Krupa and Philip discuss the complexity of cyber attacks and the role of behavioral analytics in this Facebook Live session.<\/p>\n<p>Let us know what you think via comments.<\/p>\n<p><iframe loading=\"lazy\" class=\" bf_frame_init\" src=\"https:\/\/www.facebook.com\/plugins\/video.php?href=https%3A%2F%2Fwww.facebook.com%2FInfobloxinc%2Fvideos%2F1892955797387222%2F&amp;show_text=0&amp;width=560\" width=\"560\" height=\"315\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<h3 id=\"toc-hId--1365761194\">Infoblox Support for Fast Flux and Domain Generation Algorithm (DGA) Detection<\/h3>\n<p>Infoblox provides detecting Fast Flux and DGA threats using behavioral analytics. You can try how behavioral analytics can help you by trialing ActiveTrust Cloud.<\/p>\n<h4 id=\"toc-hId-2009255320\">FREE 30-DAY EVALUATION<\/h4>\n<p>Here is the\u00a0<a href=\"http:\/\/info.info%3Cp%3Eblox.com\/activetrustcloud\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">link to sign-up for ActiveTrust Cloud service<\/a>\u00a0for a free 30-day trial.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Going Beyond Reputation and Signature-Based Detection Algorithms Cyber attacks are getting increasingly sophisticated. Most current\u00a0security algorithms are designed to detect these attacks using the previous malware and malicious domains history. \u00a0Such algorithms are at a loss when it comes to detecting new threats that don&#8217;t have any history. A new way is emerging to detect [&hellip;]<\/p>\n","protected":false},"author":270,"featured_media":1707,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[15,40],"class_list":{"0":"post-2348","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-security","9":"tag-threat-intelligence","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Behavioral Analytics can Help Detect 0-Day Threats<\/title>\n<meta name=\"description\" content=\"Going Beyond Reputation and Signature-Based Detection Algorithms\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Behavioral Analytics can Help Detect 0-Day Threats\" \/>\n<meta property=\"og:description\" content=\"Going Beyond Reputation and Signature-Based Detection Algorithms\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-18T21:20:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Srinivas Penumaka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Srinivas Penumaka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/\"},\"author\":{\"name\":\"Srinivas Penumaka\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4404b78793ca92db7dee7f4b841f5293\"},\"headline\":\"How Behavioral Analytics can Help Detect 0-Day Threats\",\"datePublished\":\"2017-09-18T21:20:35+00:00\",\"dateModified\":\"2020-05-06T17:27:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/\"},\"wordCount\":188,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1.jpg\",\"keywords\":[\"Security\",\"Threat Intelligence\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/\",\"name\":\"How Behavioral Analytics can Help Detect 0-Day Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1.jpg\",\"datePublished\":\"2017-09-18T21:20:35+00:00\",\"dateModified\":\"2020-05-06T17:27:57+00:00\",\"description\":\"Going Beyond Reputation and Signature-Based Detection Algorithms\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Make DNS Your First Line of Defense Against Data Exfiltration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-behavioral-analytics-can-help-detect-0-day-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Behavioral Analytics can Help Detect 0-Day Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4404b78793ca92db7dee7f4b841f5293\",\"name\":\"Srinivas Penumaka\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"caption\":\"Srinivas Penumaka\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/srinivas-penumaka\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Behavioral Analytics can Help Detect 0-Day Threats","description":"Going Beyond Reputation and Signature-Based Detection Algorithms","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/","og_locale":"en_US","og_type":"article","og_title":"How Behavioral Analytics can Help Detect 0-Day Threats","og_description":"Going Beyond Reputation and Signature-Based Detection Algorithms","og_url":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/","og_site_name":"Infoblox Blog","article_published_time":"2017-09-18T21:20:35+00:00","article_modified_time":"2020-05-06T17:27:57+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","type":"image\/jpeg"}],"author":"Srinivas Penumaka","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Srinivas Penumaka","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/"},"author":{"name":"Srinivas Penumaka","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4404b78793ca92db7dee7f4b841f5293"},"headline":"How Behavioral Analytics can Help Detect 0-Day Threats","datePublished":"2017-09-18T21:20:35+00:00","dateModified":"2020-05-06T17:27:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/"},"wordCount":188,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","keywords":["Security","Threat Intelligence"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/","url":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/","name":"How Behavioral Analytics can Help Detect 0-Day Threats","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","datePublished":"2017-09-18T21:20:35+00:00","dateModified":"2020-05-06T17:27:57+00:00","description":"Going Beyond Reputation and Signature-Based Detection Algorithms","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","width":660,"height":454,"caption":"Make DNS Your First Line of Defense Against Data Exfiltration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How Behavioral Analytics can Help Detect 0-Day Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4404b78793ca92db7dee7f4b841f5293","name":"Srinivas Penumaka","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","caption":"Srinivas Penumaka"},"url":"https:\/\/www.infoblox.com\/blog\/author\/srinivas-penumaka\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/270"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2348"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2348\/revisions"}],"predecessor-version":[{"id":2351,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2348\/revisions\/2351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1707"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}