Esc
Identifier Analysis
Definition
Analyzing identifier artifacts such as IP address, domain names, or URL(I)s.
loading...
Technique Subclasses
There are 9 techniques in this category, Identifier Analysis.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Identifier Analysis | D3-ID | Analyzing identifier artifacts such as IP address, domain names, or URL(I)s. | |
| - Domain Name Reputation Analysis | D3-DNRA | Analyzing the reputation of a domain name. | |
| - Homoglyph Detection | D3-HD | Comparing strings using a variety of techniques to determine if a deceptive or malicious string is being presented to a user. | |
| - URL Analysis | D3-UA | Determining if a URL is benign or malicious by analyzing the URL or its components. | |
| - Identifier Activity Analysis | D3-IAA | Taking known malicious identifiers and determining if they are present in a system. | |
| - Identifier Reputation Analysis | D3-IRA | Analyzing the reputation of an identifier. | |
| - File Hash Reputation Analysis | D3-FHRA | Analyzing the reputation of a file hash. | |
| - IP Reputation Analysis | D3-IPRA | Analyzing the reputation of an IP address. | |
| - URL Reputation Analysis | D3-URA | Analyzing the reputation of a URL. |
loading...