2014
DOI: 10.1080/01402390.2014.977382
|View full text |Cite
|
Sign up to set email alerts
|

Attributing Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
142
0
11

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 376 publications
(165 citation statements)
references
References 14 publications
0
142
0
11
Order By: Relevance
“…In a general case, the problem of detection of anomalies, cyber-attacks or threats to MCCS boils down to the following [1,3,9,14,24,28,29]. Certain set of objects is explored, in our case this is PA − the number of possible targets from the side that attacks MCCS.…”
Section: The Model Of Logical Procedures Of Detection Of Anomalies Anmentioning
confidence: 99%
“…In a general case, the problem of detection of anomalies, cyber-attacks or threats to MCCS boils down to the following [1,3,9,14,24,28,29]. Certain set of objects is explored, in our case this is PA − the number of possible targets from the side that attacks MCCS.…”
Section: The Model Of Logical Procedures Of Detection Of Anomalies Anmentioning
confidence: 99%
“…The strategic component of attributing cyberattacks has been studied in the context of single attacks against specific systems using game theory (27)(28)(29)(30), but these models do not account for the larger sociopolitical landscape. This broader context has been studied qualitatively using a variety of models (15,31,32). Attribution from an economic perspective was studied by ref.…”
Section: Significancementioning
confidence: 99%
“…Many of the known attribution methods for cyber can be spoofed (15). Unlike biological or nuclear events, digital records can be copied, altered, created, or deleted; identities can be faked; and attacks can be disguised as accidents or incompetence.…”
mentioning
confidence: 99%
“…However, this particular problem may have been oversold somewhat. Cyber intelligence capabilities are improving (Rid & Buchanan 2014) and the anonymity of large-scale attacks is difficult to maintain (Lindsay, 2015a, b, 56).…”
Section: Damage Limitationmentioning
confidence: 99%