Esc
Identifier Analysis
Definition
Analyzing identifier artifacts such as IP address, domain names, or URL(I)s.
loading...
Technique Subclasses
There are 9 techniques in this category, Identifier Analysis.
Name | ID | Definition | Synonyms |
---|---|---|---|
Identifier Analysis | D3-ID | Analyzing identifier artifacts such as IP address, domain names, or URL(I)s. | |
- URL Analysis | D3-UA | Determining if a URL is benign or malicious by analyzing the URL or its components. | |
- Homoglyph Detection | D3-HD | Comparing strings using a variety of techniques to determine if a deceptive or malicious string is being presented to a user. | |
- Identifier Activity Analysis | D3-IAA | Taking known malicious identifiers and determining if they are present in a system. | |
- Identifier Reputation Analysis | D3-IRA | Analyzing the reputation of an identifier. | |
- Domain Name Reputation Analysis | D3-DNRA | Analyzing the reputation of a domain name. | |
- File Hash Reputation Analysis | D3-FHRA | Analyzing the reputation of a file hash. | |
- IP Reputation Analysis | D3-IPRA | Analyzing the reputation of an IP address. | |
- URL Reputation Analysis | D3-URA | Analyzing the reputation of a URL. |
loading...
D3FEND™
A knowledge graph of cybersecurity countermeasures