Abstract
Cyber attribution is the process by which the identity of an actor or aggressor in a cyberactivity is determined. Conducting this process presents several unique problems; chief among them are that the technical artifacts produced by cyberattacks are difficult to understand, and it is easy (and quite useful) for an actor to perform deception.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
E. Nunes, N. Kulkarni, P. Shakarian, A. Ruef, and J. Little. Cyber-deception and attribution in capture-the-flag exercises. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 962–965. ACM, 2015.
E. Nunes, P. Shakarian, G. I. Simari, and A. Ruef. Argumentation models for cyber attribution. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 837–844. IEEE, 2016.
A. Ruef, E. Nunes, P. Shakarian, and G. I. Simari. Measuring cyber attribution in games. In Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), pages 28–32, 2017.
P. Shakarian, G. I. Simari, G. Moores, D. Paulo, S. Parsons, M. A. Falappa, and A. Aleali. Belief revision in structured probabilistic argumentation. Annals of Mathematics and Artificial Intelligence, 78(3-4):259–301, 2016.
G. I. Simari, P. Shakarian, and M. A. Falappa. A quantitative approach to belief revision in structured probabilistic argumentation. Annals of Mathematics and Artificial Intelligence, 76(3-4):375–408, 2016.
J. Swarner. Before WannaCry was unleashed, hackers plotted about it on the Dark Web. 2017. Available at: http://www.slate.com/blogs/future_tense/2017/05/23/before_wannacry_was_unleashed_hackers_plotted_about_it_on_the_dark_web.html.
D. A. Wheeler and G. N. Larsen. Techniques for cyber attack attribution. Technical report, Institute for Defense Analyses, 2003.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Nunes, E., Shakarian, P., Simari, G.I., Ruef, A. (2018). Introduction. In: Artificial Intelligence Tools for Cyber Attribution. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-73788-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-73788-1_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73787-4
Online ISBN: 978-3-319-73788-1
eBook Packages: Computer ScienceComputer Science (R0)