File size: 1,352 Bytes
96124b6 1b6bb9c |
1 2 3 4 5 6 7 8 9 10 11 12 13 |
---
license: cc-by-2.0
---
A dataset containing both DGA and normal domain names. The normal domain names were taken from the Alexa top one million domains.
An additional 3,161 normal domains were included in the dataset, provided by the Bambenek Consulting feed. This later group is particularly interesting since it consists
of suspicious domain names that were not generated by DGA. Therefore, the total amount of domains normal in the dataset is 1,003,161. DGA domains
were obtained from the repositories of DGA domains of [Andrey Abakumov](https://github.com/andrewaeva/DGA) and [John Bambenek](http://osint.bambenekconsulting.com/feeds/).
The total amount of DGA domains is 1,915,335, and they correspond to 51 different malware families. DGA domains were generated by 51 different malware families.
%About the 55% of of the DGA portion of dataset is composed of samples from the Banjori, Post, Timba, Cryptolocker, Ramdo and Conficker malware.
The DGA generation scheme followed by the malware families includes the simple arithmetical (A) and the recent word based (W) schemes.
Under the arithmetic scheme, the algorithm usually calculates a sequence of values that have a direct ASCII representation usable for a domain name.
On the other hand, word-based consists of concatenating a sequence of words from one or more wordlists. |