{"id":1044,"date":"2019-07-15T17:20:28","date_gmt":"2019-07-15T17:20:28","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1044"},"modified":"2020-05-06T10:26:57","modified_gmt":"2020-05-06T17:26:57","slug":"detecting-dgas-is-like-forecasting-weather","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/","title":{"rendered":"Detecting DGAs is like Forecasting Weather"},"content":{"rendered":"<p>DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded\/encrypted and often have a short life span. Hackers use DGAs to evade the detection or blocking from static blacklist-based systems, for example, (some) firewalls using threat intelligence data that does not get updated as frequently as needed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1045 \" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/flock-of-birds-in-sky.jpg\" alt=\"Detecting DGAs is like Forecasting Weather\" width=\"581\" height=\"387\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky.jpg 3888w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky-300x200.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky-768x512.jpg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky-1024x683.jpg 1024w\" sizes=\"auto, (max-width: 581px) 100vw, 581px\" \/><\/p>\n<p>It is not easy to detect DGAs because they satisfy the DNS protocol in every manner and there is usually no signature to identify them. This is why we use artificial intelligence\/machine learning technology to detect them.<\/p>\n<p>If you look at some DGA domains you can find that quite often they appear to be collections of random characters, and because of that, from lexical analysis point of view they are statically quite different from normal domains. On top of that, they usually do not resolve to IP addresses since most of them are not even registered. Both of these are very important characteristics, or \u201cfeatures\u201d as called in machine learning, to be used when we train the machine learning models.<\/p>\n<p>Machine learning works similar to the way human beings forecasted weather before certain modern technologies, including sensors and computers were invented. We observed lots of similar independent signals such as temperature, wind direction and animal behavior then associated them based on very long term of observation. If you think of some weather proverbs you will know what I mean.<\/p>\n<p>Just like weather forecasting, the effectiveness of using machine learning may have false detections as the training data might be biased or not applicable. Since DGAs are early indicator of malicious activities, such false detections can be handled depending on users\u2019 risk tolerance levels.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded\/encrypted and often have a short life span. Hackers use DGAs to evade the detection or blocking from static blacklist-based systems, for example, (some) firewalls using threat intelligence data that does not get updated as frequently [&hellip;]<\/p>\n","protected":false},"author":249,"featured_media":1045,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[32,15],"class_list":{"0":"post-1044","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-malware","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Detecting DGAs is like Forecasting Weather<\/title>\n<meta name=\"description\" content=\"DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded\/encrypted and often have a short life span.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detecting DGAs is like Forecasting Weather\" \/>\n<meta property=\"og:description\" content=\"DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded\/encrypted and often have a short life span.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-15T17:20:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3888\" \/>\n\t<meta property=\"og:image:height\" content=\"2592\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Philip Quian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Philip Quian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/\"},\"author\":{\"name\":\"Philip Quian\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/6a924a7ce4c0b4614b9b69fdeaea7cab\"},\"headline\":\"Detecting DGAs is like Forecasting Weather\",\"datePublished\":\"2019-07-15T17:20:28+00:00\",\"dateModified\":\"2020-05-06T17:26:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/\"},\"wordCount\":288,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/flock-of-birds-in-sky.jpg\",\"keywords\":[\"Malware\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/\",\"name\":\"Detecting DGAs is like Forecasting Weather\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/flock-of-birds-in-sky.jpg\",\"datePublished\":\"2019-07-15T17:20:28+00:00\",\"dateModified\":\"2020-05-06T17:26:57+00:00\",\"description\":\"DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded\\\/encrypted and often have a short life span.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/flock-of-birds-in-sky.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/flock-of-birds-in-sky.jpg\",\"width\":3888,\"height\":2592,\"caption\":\"Detecting DGAs is like Forecasting Weather\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/detecting-dgas-is-like-forecasting-weather\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Detecting DGAs is like Forecasting Weather\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/6a924a7ce4c0b4614b9b69fdeaea7cab\",\"name\":\"Philip Quian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_249_1571768621-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_249_1571768621-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_249_1571768621-96x96.jpg\",\"caption\":\"Philip Quian\"},\"description\":\"Philip Qian is currently a senior product manager in security at Infoblox, Inc. where he manages analytics-based threat detection products. He has more than 15 years of experience in the network security industry, having worked at McAfee and HP ArcSight. He earned a Master of Science degree in Computer Science from University of North Carolina at Chapel Hill.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/philip-quian\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Detecting DGAs is like Forecasting Weather","description":"DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded\/encrypted and often have a short life span.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/","og_locale":"en_US","og_type":"article","og_title":"Detecting DGAs is like Forecasting Weather","og_description":"DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded\/encrypted and often have a short life span.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/","og_site_name":"Infoblox Blog","article_published_time":"2019-07-15T17:20:28+00:00","article_modified_time":"2020-05-06T17:26:57+00:00","og_image":[{"width":3888,"height":2592,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky.jpg","type":"image\/jpeg"}],"author":"Philip Quian","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Philip Quian","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/"},"author":{"name":"Philip Quian","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/6a924a7ce4c0b4614b9b69fdeaea7cab"},"headline":"Detecting DGAs is like Forecasting Weather","datePublished":"2019-07-15T17:20:28+00:00","dateModified":"2020-05-06T17:26:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/"},"wordCount":288,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky.jpg","keywords":["Malware","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/","url":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/","name":"Detecting DGAs is like Forecasting Weather","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky.jpg","datePublished":"2019-07-15T17:20:28+00:00","dateModified":"2020-05-06T17:26:57+00:00","description":"DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded\/encrypted and often have a short life span.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/flock-of-birds-in-sky.jpg","width":3888,"height":2592,"caption":"Detecting DGAs is like Forecasting Weather"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/detecting-dgas-is-like-forecasting-weather\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Detecting DGAs is like Forecasting Weather"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/6a924a7ce4c0b4614b9b69fdeaea7cab","name":"Philip Quian","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_249_1571768621-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_249_1571768621-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_249_1571768621-96x96.jpg","caption":"Philip Quian"},"description":"Philip Qian is currently a senior product manager in security at Infoblox, Inc. where he manages analytics-based threat detection products. He has more than 15 years of experience in the network security industry, having worked at McAfee and HP ArcSight. He earned a Master of Science degree in Computer Science from University of North Carolina at Chapel Hill.","url":"https:\/\/www.infoblox.com\/blog\/author\/philip-quian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/249"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1044"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1044\/revisions"}],"predecessor-version":[{"id":1047,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1044\/revisions\/1047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1045"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}