Attribution in cyberspace: techniques and legal implications

JA Shamsi, S Zeadally, F Sheikh… - Security and …, 2016 - Wiley Online Library
Attribution of cybercrimes is significant in limiting the rate of crime as well as in preparing the
required level of response. Motivated by this significance, we introduce a level‐based …

Attribution of cyber attacks

KP Saalbach - Information Technology for Peace and Security: IT …, 2019 - Springer
We define cyber attribution as the allocation of a cyber attack to a certain attacker or a group
of attackers in a first step and the unveiling of the real-world identity of the attacker in a …

A taxonomy of technical attribution techniques for cyber attacks

A Nicholson, T Watson, P Norris, A Duffy… - … on information warfare …, 2012 - books.google.com
In recent years the number of cyber-attacks has dramatically increased, affecting military,
government, business and home users. For example, the UK Ministry of Defence claims to …

Attribution across cyber attack types: network intrusions and information operations

S Goel, B Nussbaum - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
The objective of this paper is to articulate the problem of attribution in cyber warfare
incidents, including, surveillance, data theft, espionage, and misinformation campaigns. As …

Attribution of malicious cyber incidents: From soup to nuts

H Lin - Journal of International Affairs, 2016 - JSTOR
Attribution of malicious cyber activities is a deep issue about which confusion and disquiet
can be found in abundance. Attribution has many aspects—technical, political, legal, policy …

[图书][B] Inside the enemy's computer: Identifying cyber-attackers

C Guitton - 2017 - books.google.com
Attribution-tracing those responsible for a cyber attack-is of primary importance when
classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions …

Under false flag: using technical artifacts for cyber attack attribution

F Skopik, T Pahi - Cybersecurity, 2020 - Springer
The attribution of cyber attacks is often neglected. The consensus still is that little can be
done to prosecute the perpetrators–and unfortunately, this might be right in many cases …

Three tales of attribution in cyberspace: Criminal law, international law and policy debates

D Broeders, E De Busser, P Pawlak - The Hague Program for …, 2020 - papers.ssrn.com
Attribution strengthens the ability of an actor to identify those responsible for malicious
activities in cyberspace and potentially hold them accountable. The capacity of a state to …

Decentralized cyberattack attribution

KE Eichensehr - 2019 - cambridge.org
Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in
attributions in recent years shows that attribution is far from impossible. After several years of …

The attribution of cyber warfare 1

NC Rowe - Cyber warfare, 2015 - taylorfrancis.com
Attribution in the context of cyber warfare presents unique difficulties that are not apparent in
other conventional means and methods of armed conflict. Several factors contribute to the …