DGA Detection & Optimization
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the evolution and current state of Domain Generation Algorithms (DGAs) in cybersecurity through this 51-minute conference talk from the 44CON Information Security Conference. Delve into the advanced machine learning and spectral clustering techniques used for passive network-level detection and classification of malware families. Examine the operational methods employed by cybercriminals to evade both technological and law enforcement efforts. Gain insights into the strengths and weaknesses of DGAs, the concept of the "Goldilocks Zone" in botnet operations, and forensic analysis techniques. Learn about the latest detection technologies and countermeasures, including domain registration age analysis, as well as the ongoing cat-and-mouse game between cybersecurity professionals and malware creators in optimizing their respective strategies.
Syllabus
Intro
About me
Agenda
DJs
Domain Fluxing
Malware Fronts
DGA Goals
Why DGA
DGA domain names
Strengths Weaknesses
Goldilocks Zone
botnet elements
understanding the botnet
how to find the malware
forensics analysis
example
the bad guys
alter the algorithms
alternatives
conclusion
new detection technologies
domain registration age
Taught by
44CON Information Security Conference
Related Courses
Supply Chain Unchained - How To Be A Bad SaaS44CON Information Security Conference via YouTube Aviation Security 101
44CON Information Security Conference via YouTube The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube