Share this
Building on Machine Learning in Our Protective DNS
by David Elkind on Dec 14, 2023 4:35:03 PM
What is Malicious Domain Protection?
Malicious Domain Protection began at DNSFilter as a research project to assess whether some malicious domains can be detected by inspecting solely the domain string. This effort follows in a vein of academic research; a thorough review can be found in Harald Vranken and Hassan Alizadeh’s “Detection of DGA-generated domain names with TF-IDF”. Electronics, vol. 11, no. 3, 414, 2022. The basic premise is that some malware communicates with adversaries using domains created procedurally by domain-generation algorithms (DGA) to evade detection by security tools looking for domains known to be malicious. Typically, DGA domains are characterized by their completely random appearance, as if the user typed the domain accidentally while trying to clean up coffee spilled on a keyboard. (More sophisticated domain-generation algorithms used words, or parts of words, in a bid for inconspicuousness.)
The goal of Malicious Domain Protection is to inspect these domain strings and accurately assess their risk. While DGAs are a huge portion of what we’re able to assess with this new feature, it can go beyond DGA and may catch domains that fall into other threat vectors.
This project is now available for all customers to implement under the “extra settings” tab when creating a policy.
Why focus on just the domain string?
Can the quality of the Malicious Domain Protection be improved if we include additional data elements besides the domain string?
Malicious Domain Protection has the most value when there is relatively little other information about a domain. As a protective DNS provider, we will sometimes see queries for which there are no DNS records; inferring the riskiness of these domains lets us evaluate whether we should block them before they’re even registered. While waiting for additional information (such as a DNS response or registration information) could provide more protection for customers and context for our assessments, we assess that the corresponding delay is unfavorable.
That said, we are exploring how to incorporate the multimodal, heterogeneous DNS data and feed data into our risk assessments. DNS query data is incredibly rich, and at DNSFilter, we have a powerful data collection engine, supplemented by our third-party feed subscriptions. We intend to take full advantage of all of this data to protect our customers.
Are there any success stories about Malicious Domain Protection?
As a part of the Malicious Domain Protection pilot study, we monitored customers’ queries to domains that are malicious according to Malicious Domain Protection. On several occasions, we observed a very large number of high-risk queries and customer support reached out to those customers with the specific details of these queries. While we can’t speak to specifics, we did observe a precipitous drop in the number of high-risk queries that these customers made after we reached out and made them aware of this behavior; we attribute this to customers taking remedial action to stop the activities that lead to these queries.
In the testing phase, Malicious Domain Protection identified more than 7,000 risky domains not yet identified by any other feeds. Threats were identified up to 10 days ahead of other third-party feeds with one domain being caught 59 days ahead.
Implement Malicious Domain Protection by logging into the app and navigating to Policy → Advanced → Extra Settings.
Share this
Categories
- Featured (267)
- Protective DNS (23)
- IT (15)
- IndyCar (9)
- Content Filtering (8)
- AI (7)
- Cybersecurity Brief (7)
- IT Challenges (7)
- Public Wi-Fi (7)
- Deep Dive (6)
- Malware (4)
- Roaming Client (4)
- Team (4)
- Compare (3)
- MSP (3)
- Machine Learning (3)
- Phishing (3)
- Ransomware (3)
- Tech (3)
- Anycast (2)
- Events (2)
- Staying Ahead of Cyber Threats (2)
- Tech Stack (2)
- Secure Web Gateway (1)

Your firewall is working hard… but not smart. And cybercriminals love that.
Like a bouncer at the club with a clipboard—great at stopping the obvious troublemakers that aren’t on the list, but completely oblivious to unknown threats. They excel at blocking unauthorized access through known ports and protocols, but they often overlook a critical vulnerability: DNS traffic and what’s on the other side of a link. This oversight allows cybercrimina...

Introduction: The AI Cybersecurity Arms Race
Artificial intelligence (AI) has transformed the cybersecurity landscape—both for defenders and attackers. While AI-powered cybersecurity solutions offer advanced threat detection, AI-driven cybercrime is evolving at an alarming rate, automating attacks that are more sophisticated, evasive, and dangerous.

Imagine waking up to find your company's most sensitive data exposed, your systems locked, and your reputation in tatters. This nightmare scenario isn't just a hypothetical—it's the reality for businesses falling victim to zero-day attacks. In 2021, four zero-day exploits targeting Microsoft Exchange servers affected over 250,000 organizations worldwide, leaving countless systems vulnerable to data theft and ransomware.