{"id":3016,"date":"2015-01-14T22:51:38","date_gmt":"2015-01-14T22:51:38","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3016"},"modified":"2020-05-06T10:30:15","modified_gmt":"2020-05-06T17:30:15","slug":"using-big-data-to-outsmart-cybercriminals","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/","title":{"rendered":"Using Big Data to Outsmart Cybercriminals"},"content":{"rendered":"<p>Big data is useful for more than just figuring how much milk needs to be stocked in supermarkets. I\u2019ve joined with two members of my team to research new methods for using the concept of big data to detect when cybercriminals are avoiding detection on enterprise networks. Bin Yu, Mark Threefoot and I have applied for a patent in our work, which involves detecting \u201cfast flux\u201d abuse of the Domain Name System (DNS) by cybercriminals.<\/p>\n<p>Fast flux is a technique used to mask botnets, which are malicious Internet-connected programs colluding across multiple machines for automated tasks. When phishing or distributing malware, these botnets hide behind a rapidly shifting network of compromised hosts acting as proxies, employing a variety of Internet Protocol (IP) addresses associated with a legitimate domain name. Using the fast flux (also known as flux domain) technique, the botnets shift among these IP addresses. With fast flux masking both their identities and activities, cybercriminals delay or evade detection.<\/p>\n<p>As we note in the paper outlining our\u00a0<a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-08979-9_20\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">research<\/a>, fast flux \u201cexploits the stability and resilience of the DNS to make it difficult to eliminate systems being used for criminal activities. It can frustrate both administrative remedies and technical remedies. While [fast flux] isn\u2019t a threat to any component of the DNS infrastructure, it is a threat to Internet users facilitated by DNS.\u201d<\/p>\n<p>In order to differentiate malicious fast flux from the legitimate activity found in content delivery networks and network time protocol (NTP) services, we created a model focused not only on the DNS time-to-live feature (the data that prevents a message from circulating in perpetuity) but also on the trustworthiness of DNS resource records. That is, DNS messages from a highly trusted source are excused from analysis in favor of those for which there is less certainty, enabling the system to focus on the most likely suspects, rather than all suspects equally.<\/p>\n<p>Where does big data come in? By using advanced analytics technologies to combine information from an offline machine-learning system \u2013 which \u201ctrains\u201d the model to get smarter \u2013 and an online system that supports throughput of real-time DNS streaming.<\/p>\n<p>It sounds complicated \u2013 and it is \u2013 but it comes down to this: Determining the validity or invalidity of a DNS message requires the amalgamation of multiple types of information in near-real time, and our work on detection mechanisms brings us that much closer to identifying when a DNS server is being spoofed.<\/p>\n<p>Testing 200 days\u2019 worth of DNS data (collected between November 2012 to June 2013), we analyzed 10 million DNS messages for 906 unique domains classified as fast flux. Out of all those messages, they were able to identify almost 24,000 potentially suspect messages using fast flux technology. Needless to say, the amount of work involved in blocking 24,000 DNS messages versus 10 million is considerably less \u2013 and faster.<\/p>\n<p>As we said in our research paper, \u201cIf such a type of threat can be detected and mitigated on a DNS transaction that is often the entry point for network connections, the network is that much safer.\u201d<\/p>\n<p>It\u2019s too soon to say for sure how Infoblox will use this research, but we\u2019re continuing to look for new ways to make DNS infrastructure more efficient and more secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big data is useful for more than just figuring how much milk needs to be stocked in supermarkets. I\u2019ve joined with two members of my team to research new methods for using the concept of big data to detect when cybercriminals are avoiding detection on enterprise networks. Bin Yu, Mark Threefoot and I have applied [&hellip;]<\/p>\n","protected":false},"author":232,"featured_media":2761,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,51,15],"class_list":{"0":"post-3016","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-ipam","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using Big Data to Outsmart Cybercriminals<\/title>\n<meta name=\"description\" content=\"Big data is useful for more than just figuring how much milk needs to be stocked in supermarkets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Big Data to Outsmart Cybercriminals\" \/>\n<meta property=\"og:description\" content=\"Big data is useful for more than just figuring how much milk needs to be stocked in supermarkets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-14T22:51:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Les Smith\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Les Smith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/\"},\"author\":{\"name\":\"Les Smith\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/c6fb2b069f4a5715484446657eec6e5e\"},\"headline\":\"Using Big Data to Outsmart Cybercriminals\",\"datePublished\":\"2015-01-14T22:51:38+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/\"},\"wordCount\":540,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"keywords\":[\"Infoblox\",\"IPAM\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/\",\"name\":\"Using Big Data to Outsmart Cybercriminals\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"datePublished\":\"2015-01-14T22:51:38+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"description\":\"Big data is useful for more than just figuring how much milk needs to be stocked in supermarkets.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fighting Point-of-Sale (POS) Malware by Using DNS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-big-data-to-outsmart-cybercriminals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Using Big Data to Outsmart Cybercriminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/c6fb2b069f4a5715484446657eec6e5e\",\"name\":\"Les Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/68c376e8fa029571b468635429861c39fa4f7944f695baa155f08e7cb9aa426c?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/68c376e8fa029571b468635429861c39fa4f7944f695baa155f08e7cb9aa426c?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/68c376e8fa029571b468635429861c39fa4f7944f695baa155f08e7cb9aa426c?s=96&d=blank&r=g\",\"caption\":\"Les Smith\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/les-smith\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using Big Data to Outsmart Cybercriminals","description":"Big data is useful for more than just figuring how much milk needs to be stocked in supermarkets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/","og_locale":"en_US","og_type":"article","og_title":"Using Big Data to Outsmart Cybercriminals","og_description":"Big data is useful for more than just figuring how much milk needs to be stocked in supermarkets.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/","og_site_name":"Infoblox Blog","article_published_time":"2015-01-14T22:51:38+00:00","article_modified_time":"2020-05-06T17:30:15+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","type":"image\/jpeg"}],"author":"Les Smith","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Les Smith","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/"},"author":{"name":"Les Smith","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/c6fb2b069f4a5715484446657eec6e5e"},"headline":"Using Big Data to Outsmart Cybercriminals","datePublished":"2015-01-14T22:51:38+00:00","dateModified":"2020-05-06T17:30:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/"},"wordCount":540,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","keywords":["Infoblox","IPAM","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/","url":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/","name":"Using Big Data to Outsmart Cybercriminals","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","datePublished":"2015-01-14T22:51:38+00:00","dateModified":"2020-05-06T17:30:15+00:00","description":"Big data is useful for more than just figuring how much milk needs to be stocked in supermarkets.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","width":660,"height":454,"caption":"Fighting Point-of-Sale (POS) Malware by Using DNS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/using-big-data-to-outsmart-cybercriminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Using Big Data to Outsmart Cybercriminals"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/c6fb2b069f4a5715484446657eec6e5e","name":"Les Smith","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/68c376e8fa029571b468635429861c39fa4f7944f695baa155f08e7cb9aa426c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/68c376e8fa029571b468635429861c39fa4f7944f695baa155f08e7cb9aa426c?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68c376e8fa029571b468635429861c39fa4f7944f695baa155f08e7cb9aa426c?s=96&d=blank&r=g","caption":"Les Smith"},"url":"https:\/\/www.infoblox.com\/blog\/author\/les-smith\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/232"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3016"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3016\/revisions"}],"predecessor-version":[{"id":3017,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3016\/revisions\/3017"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2761"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}