作者
Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little
发表日期
2015/8/25
研讨会论文
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015
页码范围
962-965
出版商
ACM
简介
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is known. In this work, we use various classification techniques to identify the culprit in a cyberattack and find that deceptive activities account for the majority of misclassified samples. We also explore several heuristics to alleviate some of the misclassification caused by deception.
引用总数
201620172018201920202021202220234283523
学术搜索中的文章
E Nunes, N Kulkarni, P Shakarian, A Ruef, J Little - Proceedings of the 2015 IEEE/ACM International …, 2015