Statements (22)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity technique
|
gptkbp:category |
cybercrime
network security DNS abuse |
gptkbp:countermeasures |
IP blacklisting
DNS monitoring sinkholing |
gptkbp:firstObserved |
mid-2000s
|
https://www.w3.org/2000/01/rdf-schema#label |
fast-flux DNS
|
gptkbp:notableExample |
Conficker worm
Storm botnet |
gptkbp:relatedTo |
malware
phishing spam |
gptkbp:type |
double-flux
single-flux |
gptkbp:usedBy |
botnets
|
gptkbp:usedFor |
concealing malicious infrastructure
|
gptkbp:uses |
multiple IP addresses
rapidly changing DNS records |
gptkbp:bfsParent |
gptkb:Necurs
|
gptkbp:bfsLayer |
7
|