
Machine Learning Detected a DNS Request Predicted to be a DGA Domain
Elastic Detection Rules
View SourceSummary
This rule utilizes a supervised machine learning model to detect Domain Generation Algorithm (DGA) activity by analyzing DNS queries. Specifically, it identifies DNS question names predicted to be generated by DGAs, which are often associated with command and control (C2) activities used by adversaries. The model flags these requests, allowing security teams to pinpoint potential security incidents. Implementing this rule requires the integration of DNS event data from sources such as Elastic Defend, Network Packet Capture, or Packetbeat and the installation of DGA Detection integration assets. The rule aims to mitigate risks from dynamic DNS queries used to bypass traditional security, thereby enhancing monitoring of unusual network behavior. False positives may arise from legitimate services like content delivery networks, necessitating careful review and management of exceptions.
Categories
- Network
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Network Traffic
- Process
- Application Log
ATT&CK Techniques
- T1568
- T1568.002
Created: 2023-09-14