Update README.md
Browse files
README.md
CHANGED
@@ -1,3 +1,13 @@
|
|
1 |
---
|
2 |
license: cc-by-2.0
|
3 |
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
---
|
2 |
license: cc-by-2.0
|
3 |
---
|
4 |
+
A dataset containing both DGA and normal domain names. The normal domain names were taken from the Alexa top one million domains.
|
5 |
+
An additional 3,161 normal domains were included in the dataset, provided by the Bambenek Consulting feed. This later group is particularly interesting since it consists
|
6 |
+
of suspicious domain names that were not generated by DGA. Therefore, the total amount of domains normal in the dataset is 1,003,161. DGA domains
|
7 |
+
were obtained from the repositories of DGA domains of [Andrey Abakumov](https://github.com/andrewaeva/DGA) and [John Bambenek](http://osint.bambenekconsulting.com/feeds/).
|
8 |
+
The total amount of DGA domains is 1,915,335, and they correspond to 51 different malware families. DGA domains were generated by 51 different malware families.
|
9 |
+
%About the 55% of of the DGA portion of dataset is composed of samples from the Banjori, Post, Timba, Cryptolocker, Ramdo and Conficker malware.
|
10 |
+
|
11 |
+
The DGA generation scheme followed by the malware families includes the simple arithmetical (A) and the recent word based (W) schemes.
|
12 |
+
Under the arithmetic scheme, the algorithm usually calculates a sequence of values that have a direct ASCII representation usable for a domain name.
|
13 |
+
On the other hand, word-based consists of concatenating a sequence of words from one or more wordlists.
|