翻訳と辞書
Words near each other
・ Domain aftermarket
・ Domain analysis
・ Domain Application Protocol
・ Domain Assurance Council
・ Domain Athletic Centre
・ Domain Awareness System
・ Domain Central
・ Domain coloring
・ Domain congéable
・ Domain controller
・ Domain Day
・ Domain decomposition methods
・ Domain Developers Fund
・ Domain drop catching
・ Domain engineering
Domain generation algorithm
・ Domain Group
・ Domain hack
・ Domain Highway
・ Domain hijacking
・ Domain Interchange
・ Domain inventory pattern
・ Domain knowledge
・ Domain masking
・ Domain Master Browser
・ Domain model
・ Domain name
・ Domain name auction
・ Domain name drop list
・ Domain name front running


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Domain generation algorithm : ウィキペディア英語版
Domain generation algorithm
Domain generation algorithm (DGA) are algorithms seen in various families of malware that are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control servers. The large number of potential rendezvous points makes it difficult for law enforcement to effectively shut down botnets since infected computers will attempt to contact some of these domain names every day to receive updates or commands. By using public-key cryptography, it is unfeasible for law enforcement and other actors to mimic commands from the malware controllers as some worms will automatically reject any updates not signed by the malware controllers.
For example, an infected computer could create thousands of domain names such as: ''www..com'' and would attempt to contact a portion of these with the purpose of receiving an update or commands.
Embedding the DGA instead of a list of previously-generated (by the command and control server(s)) domains in the unobfuscated binary of the malware protects against a strings dump that could be fed into a network blacklisting appliance preemptively to attempt to restrict outbound communication from infected hosts within an enterprise.
The technique was popularized by the family of worms Conficker.a and .b which, at first generated 250 domain names per day. Starting with Conficker.C, the malware would generate 50,000 domain names every day of which it would attempt to contact 500, giving an infected machine a 1% possibility of being updated every day if the malware controllers registered only one domain per day. To prevent infected computers from updating their malware, law enforcement would have needed to pre-register 50,000 new domain names every day.
Recently, the technique has been adopted by other malware authors. According to network security firm Damballa, the top 5 most prevalent DGA-based crimeware families are Conficker, Murofet, BankPatch, Bonnana and Bobax.〔(【引用サイトリンク】title=Top-5 Most Prevalent DGA-based Crimeware Families )
It can also combine words from a dictionary to generate domains using a web service through an web API.
== Example ==

def generate_domain(year, month, day):
"""Generates a domain name for the given date."""
domain = ""
for i in range(16):
year = ((year ^ 8
* year) >> 11) ^ ((year & 0xFFFFFFF0) << 17)
month = ((month ^ 4
* month) >> 25) ^ 16
* (month & 0xFFFFFFF8)
day = ((day ^ (day << 13)) >> 19) ^ ((day & 0xFFFFFFFE) << 12)
domain += chr(((year ^ month ^ day) % 25) + 97)
return domain

E.g., on January 7th, 2014, this method would generate the domain name intgmxdeadnxuyla, while the following day, it would return axwscwsslmiagfah. This simple example was in fact used by malware like CryptoLocker, before it switched to a more sophisticated variant.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Domain generation algorithm」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.