Attackers use domain generation algorithms (DGA) to generate huge amounts of domains. These domains are then used to perform various malicious attacks including (but not limited to) C2 servers in malware attack, phishing domains, tech support scam websites. The domains are generated using various algorithms (phish kits) to evade detection from security software. In this hackathon project, we would like to create a working machine learning based classifier which will detect domains generated using DGAs. This can protect users from being compromised.
-
Couldn't load subscription status.
- Fork 1
Attackers use domain generation algorithms (DGA) to generate huge amounts of domains. These domains are then used to perform various malicious attacks including (but not limited to) C2 servers in malware attack, phishing domains, tech support scam websites. The domains are generated using various algorithms (phish kits) to evade detection from s…
License
Couldn't load subscription status.
bkuriach/malicious-dga-detection
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
About
Attackers use domain generation algorithms (DGA) to generate huge amounts of domains. These domains are then used to perform various malicious attacks including (but not limited to) C2 servers in malware attack, phishing domains, tech support scam websites. The domains are generated using various algorithms (phish kits) to evade detection from s…