TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Exercise to Detect Algorithmically Generated Domain Names

44 pointsby boydalmost 11 years ago

3 comments

kenny_ralmost 11 years ago
In the output of line 85 there two punycoded[1] domain names: xn--g5t518j which is actually 微風 and xn--42cgk1gc8crdb1htg3d which is actually มอไซค์มือสอง.<p>As a result of the encoding, the domain names look junky while perhaps they aren&#x27;t.<p>[1]: <a href="https://en.wikipedia.org/wiki/Punycode" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Punycode</a>
评论 #8042392 未加载
AlyssaRowanalmost 11 years ago
Awesome. Statistics are fun.<p>One little issue is that&#x27;s assuming techniques like this aren&#x27;t used to <i>generate</i> the domains, which is not only an obvious &#x27;next step&#x27;, but thanks to the &#x27;weird&#x27; domains and the find-web-online-lol.info type results which look <i>incredibly</i> spammy, is probably already happening and has probably been happening for years (wouldn&#x27;t surprise me with the amount of spam wielding Markov chain generators out there). That&#x27;s definitely what I&#x27;d do if I was in the position of the VXer, if I was determined to use DNS at all.<p>Wonder if any of those are &#x27;fast-flux&#x27;?
nightcrackeralmost 11 years ago
Really cool presentation.