Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

Cyber attribution is the process by which the identity of an actor or aggressor in a cyberactivity is determined. Conducting this process presents several unique problems; chief among them are that the technical artifacts produced by cyberattacks are difficult to understand, and it is easy (and quite useful) for an actor to perform deception.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. E. Nunes, N. Kulkarni, P. Shakarian, A. Ruef, and J. Little. Cyber-deception and attribution in capture-the-flag exercises. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 962–965. ACM, 2015.

    Google Scholar 

  2. E. Nunes, P. Shakarian, G. I. Simari, and A. Ruef. Argumentation models for cyber attribution. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 837–844. IEEE, 2016.

    Google Scholar 

  3. A. Ruef, E. Nunes, P. Shakarian, and G. I. Simari. Measuring cyber attribution in games. In Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), pages 28–32, 2017.

    Google Scholar 

  4. P. Shakarian, G. I. Simari, G. Moores, D. Paulo, S. Parsons, M. A. Falappa, and A. Aleali. Belief revision in structured probabilistic argumentation. Annals of Mathematics and Artificial Intelligence, 78(3-4):259–301, 2016.

    Article  MathSciNet  MATH  Google Scholar 

  5. G. I. Simari, P. Shakarian, and M. A. Falappa. A quantitative approach to belief revision in structured probabilistic argumentation. Annals of Mathematics and Artificial Intelligence, 76(3-4):375–408, 2016.

    Article  MathSciNet  MATH  Google Scholar 

  6. J. Swarner. Before WannaCry was unleashed, hackers plotted about it on the Dark Web. 2017. Available at: http://www.slate.com/blogs/future_tense/2017/05/23/before_wannacry_was_unleashed_hackers_plotted_about_it_on_the_dark_web.html.

    Google Scholar 

  7. D. A. Wheeler and G. N. Larsen. Techniques for cyber attack attribution. Technical report, Institute for Defense Analyses, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nunes, E., Shakarian, P., Simari, G.I., Ruef, A. (2018). Introduction. In: Artificial Intelligence Tools for Cyber Attribution. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-73788-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73788-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73787-4

  • Online ISBN: 978-3-319-73788-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics