Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 348

Domain Generation Algorithm (DGA)

What is Domain Generation Algorithm (DGA)?

Domain Generation Algorithm (DGA)An algorithm used by malware to deterministically generate large numbers of candidate domain names so infected hosts can find their command-and-control server.


A Domain Generation Algorithm is code embedded in malware that produces hundreds or thousands of pseudo-random domain names per day, seeded by the date or another shared value. Infected hosts try the day's domains in sequence; the attacker only needs to register a few of them to rendezvous with the botnet. DGAs defeat static blocklists because defenders cannot enumerate every possible C2 domain in advance. Conficker famously generated 50,000 domains a day, and Necurs, Murofet, and Mirai variants have used the technique. Defences include DGA classifiers on DNS logs, passive DNS lookups, sinkholing newly observed algorithm-generated names, and EDR detection of bursty NXDOMAIN traffic.

Examples

  1. 01

    Conficker.C generated 50,000 candidate domains daily across multiple TLDs.

  2. 02

    Necurs and Murofet used date-seeded DGAs to rendezvous with their C2 channels.

Frequently asked questions

What is Domain Generation Algorithm (DGA)?

An algorithm used by malware to deterministically generate large numbers of candidate domain names so infected hosts can find their command-and-control server. It belongs to the Attacks & Threats category of cybersecurity.

What does Domain Generation Algorithm (DGA) mean?

An algorithm used by malware to deterministically generate large numbers of candidate domain names so infected hosts can find their command-and-control server.

How does Domain Generation Algorithm (DGA) work?

A Domain Generation Algorithm is code embedded in malware that produces hundreds or thousands of pseudo-random domain names per day, seeded by the date or another shared value. Infected hosts try the day's domains in sequence; the attacker only needs to register a few of them to rendezvous with the botnet. DGAs defeat static blocklists because defenders cannot enumerate every possible C2 domain in advance. Conficker famously generated 50,000 domains a day, and Necurs, Murofet, and Mirai variants have used the technique. Defences include DGA classifiers on DNS logs, passive DNS lookups, sinkholing newly observed algorithm-generated names, and EDR detection of bursty NXDOMAIN traffic.

How do you defend against Domain Generation Algorithm (DGA)?

Defences for Domain Generation Algorithm (DGA) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Domain Generation Algorithm (DGA)?

Common alternative names include: DGA, Algorithmic C2 domains.

Related terms

See also