作者
Jawwad A Shamsi, Sherali Zeadally, Fareha Sheikh, Angelyn Flowers
发表日期
2016/10
期刊
Security and Communication Networks
卷号
9
期号
15
页码范围
2886-2900
简介
Attribution of cybercrimes is significant in limiting the rate of crime as well as in preparing the required level of response. Motivated by this significance, we introduce a level‐based approach for achieving attribution. In our proposed approach, attribution consists of three steps: (1) identification of the cyberweapon used; (2) determination of the origin of the attack; and (3) identification of the actual attacker. We conduct an in‐depth analysis of recently proposed attribution techniques. Our analysis reveals that indirect methods of attribution are particularly effective when attributing cybercrimes; many of them remain unattributed. We also discuss some of the legal issues pertaining to attribution, and we argue that well‐defined international laws for cyberspace along with strong cooperation among governments are needed to track down and punish cybercriminals. Copyright © 2016 John Wiley & Sons, Ltd.
引用总数
20172018201920202021202220232024478610753
学术搜索中的文章
JA Shamsi, S Zeadally, F Sheikh, A Flowers - Security and Communication Networks, 2016