Domain Generation Algorithm Botnets
They have the creativity and ingenuity to create malware and botnets that can bring an enterprise s entire network to its knees causing interruption of critical services and compromising sensitive valuable.
Domain generation algorithm botnets. Instead of relying upon a static list of preconfigured domain names that corresponded to the location of the badguys c c servers it used an algorithm to calculate candidate domain names and then tried reaching out to a handful of the candidates in a vein attempt to locate. The use of public key cryptograph. Domain generation algorithms are algorithms seen in various families of malware that are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control servers.
Abstract do you remember all the fuss about conficker many moons ago and its odd method of locating c c servers. Detection techniques have been proposed to identify malicious domain names generated by dgas. Domain generation algorithms dgas are widely used by modern botnets to keep botnets hidden from security personnel.
They can generate a large number of domains which are used as rendezvous between botmasters and bots. The large number of potential rendezvous points makes it difficult for law enforcement to effectively shut down botnets since infected computers will attempt to contact some of these domain names every day to receive updates or commands.