Elastic Security: From Emulation To Detection