ThreatSTOP Blog

Enhancing DNS Security with Machine Learning

Written by Sarah Dontogan | June 2, 2025

We’re proud to announce that ThreatSTOP is now using Machine Learning (ML) to enhance the protections we deliver to our customers.

This isn’t a marketing gimmick or a checkbox feature. We’re not throwing around terms like “AI” for attention. We’re applying real machine learning models to solve a real-world cybersecurity problem: detecting and stopping malicious domains that traditional methods miss.  When we visited RSA2025 this year, "AI" was baked into many company names and solutions on the show floor.  This announcement isn't marketing, it's something we're doing.

Our models are trained on massive volumes of DNS telemetry and threat intelligence. They’re designed to identify subtle patterns and domain characteristics that may indicate phishing, command and control, or other malicious activity. This intelligence is then used to augment specific targets within the ThreatSTOP ecosystem—improving the accuracy and responsiveness of our protective policies.

The best part? Our customers don’t need to take any action to benefit. As these enhancements roll out, protections will automatically improve behind the scenes, with no configuration changes required on your end.

We’re beginning this rollout in an experimental phase. If you’re interested in participating and seeing how ML-driven protections can further improve your security posture, reach out to us at support@threatstop.com and let us know.

Our Protective DNS solutions, DNS Defense Cloud and DNS Defense, are starting to use ML-driven analysis to stop malicious domains before they can impact your organization. Whether it’s phishing domains that mimic real brands or infrastructure built using random-looking domain names, our system is designed to catch threats early and automatically.

The Problem with Lookalike Domains

Cyber attackers are constantly registering domains that look just like familiar websites. A small typo, an extra character, or a clever substitution can be enough to trick someone into clicking a dangerous link. These domains are often missed by traditional filters.

ThreatSTOP’s new ML engines help spot and block these threats before they ever reach your users.

1. Identifying Similar Domains

Our system uses a proximity scoring algorithm to measure how closely a new domain resembles a known good one. For example, if someone creates “mybrqnd.com” to trick users into thinking it’s “mybrand.com,” our engine sees the similarity and flags it.

This approach is especially effective against typosquatting, where attackers depend on people not noticing small changes.

2. Using Data to Profile Domains

We don’t just look at what a domain says. We analyze how it’s built.

Our ML pulls together several data points, including:

  • Entropy Score: High-entropy domains often come from automated tools. We use this randomness measure to catch domains that look fake.

  • Structural Features: We look at length, subdomain depth, and the ratio of the name to the suffix. Strange combinations are a red flag.

  • Symbols and Numbers: Suspicious use of hyphens, numbers, or other characters can indicate a domain is up to no good.

Together, these signals create a detailed fingerprint for every domain, helping us make fast and accurate decisions.

3. Spotting Hidden Patterns in Characters

To catch new tricks that don’t rely on familiar keywords, our ML scans the domain name in small overlapping sequences. These short chunks, often three or four letters long, help us detect dangerous patterns that aren’t obvious at first glance. Over time, the system learns which sequences tend to appear in safe domains and which show up in malicious ones.

This gives us an edge in spotting brand new threats the moment they appear.

4. Watching Domains the Moment They’re Registered

We constantly monitor global DNS activity. As soon as a new domain is registered or resolved for the first time, our system evaluates it. If the domain looks risky, it can be blocked before anyone even sends the first phishing email.

This gives you a valuable time advantage. You’re able to stop attacks early instead of reacting after the fact.

5. Learning from Real-World Threats

Our ML doesn’t stand still. It keeps learning, using fresh data from across our network and from customer feedback. This process, which we call the ThreatSTOP Feedback Loop, allows us to fine-tune protections based on real-world activity.

By retraining the models when necessary, we stay ahead of attacker tactics and avoid the need for endless manual updates.

Why This Approach Works

What makes ThreatSTOP different is our ability to combine science, scale, and security expertise.

  • Multiple Layers of Analysis: We use similarity scoring, randomness detection, character pattern analysis, and more to build a complete picture of risk.

  • Real-Time Adaptability: Our system improves as new data comes in, adjusting automatically to new trends and threats.

  • Built for Your Environment: Whether you use DNS Defense Cloud or manage your own infrastructure with DNS Defense, you’re getting the same level of intelligent protection.

Our protections are created by the ThreatSTOP Security, Intelligence, and Research team. They focus on identifying and blocking command and control traffic, data exfiltration, peer-to-peer abuse, phishing, spam, DDoS activity, and other malicious behaviors that hide in the DNS layer.

Take the Next Step

ThreatSTOP is evolving, and we’re excited to introduce a new layer of intelligence into our platform. We’re now applying machine learning to help identify and block malicious domains with greater precision, giving your organization stronger protection without any added complexity.

This new capability will be used to enhance select targets in our ecosystem, providing smarter, faster, and more adaptive protection based on real-world threat signals. There’s nothing you need to configure to benefit from it — as we roll it out, your protections will automatically get stronger.

We’re beginning with an experimental phase, and we’re inviting interested customers to be part of it. If you’d like early access to our machine learning-driven protections and want to help shape how they evolve, we encourage you to get in touch.  Right now, it's available on an Opt-In basis.  We'll be rolling it out across our entire customer base very soon.

To participate in the experiment, contact us at support@threatstop.com and let us know.

For more on how ThreatSTOP protects networks of all sizes with DNS Defense Cloud, DNS Defense, and IP Defense, visit our product page. You can explore our pricing, request a demo, and find the right fit for your environment.

MITRE ATT&CK Mapping

 

MITRE Category

Technique Name

ID

How ThreatSTOP Applies

Reconnaissance

Phishing for Information

T1598.003

Detects lookalike domains designed for phishing

Command and Control

Domain Generation Algorithms

T1568.002

Uses entropy and structure analysis to block DGA

Credential Access

Spearphishing via Service

T1566.002

Prevents delivery of phishing emails using DNS

Initial Access

Drive-by Compromise

T1189

Identifies malicious hosting domains early

Persistence

Domain Fronting or Alternate Channels

T1090.004

Detects unusual subdomain patterns and use cases