
Summary
The 'Potential DGA Activity' rule is a machine learning-based detection mechanism designed to identify Domain Generation Algorithm (DGA) activities. DGAs are frequently used by malware for dynamic domain name generation, facilitating command and control (C2) communication and complicating threat mitigation. The detection is achieved through a population analysis job which monitors DNS requests made by source IP addresses, assessing their probability of being associated with DGA activity. The rule is activated for a specified time frame and relies on a series of prerequisites, including the proper integration of Elastic's DGA detection assets and collection of DNS events via tools like Elastic Defend, Network Packet Capture, or Packetbeat. The rule incorporates a risk score to prioritize alerts and includes a comprehensive guide for practitioners on how to investigate identified threats, handle potential false positives, and conduct effective remediation actions. The aim is to empower security teams to swiftly identify and respond to potential DGA threats by establishing a systematic approach to analysis and remediation.
Categories
- Network
- Endpoint
Data Sources
- Network Traffic
- Container
- Pod
ATT&CK Techniques
- T1568
Created: 2023-09-14