2021
DOI: 10.1109/ojcoms.2021.3074591
|View full text |Cite
|
Sign up to set email alerts
|

Attribution Across Cyber Attack Types: Network Intrusions and Information Operations

Abstract: The objective of this paper is to articulate the problem of attribution in cyber warfare incidents, including, surveillance, data theft, espionage, and misinformation campaigns. As the stakes increase, concerted efforts are being made by intelligence and law enforcement agencies to identify the perpetrators with much painstaking effort. Attribution tools and techniques for malicious activities on the internet are still nascent, relying mainly on technical measurements, the provenance of malicious code, and non… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 53 publications
0
6
0
Order By: Relevance
“…The identification of cyberattacks largely depends on technical analysis, which entails a meticulous examination of digital evidence and technical elements that may have been left behind (Goel & Nussbaum, 2021). With this type of investigation, important information about the source of the attack can be revealed.…”
Section: Technical Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The identification of cyberattacks largely depends on technical analysis, which entails a meticulous examination of digital evidence and technical elements that may have been left behind (Goel & Nussbaum, 2021). With this type of investigation, important information about the source of the attack can be revealed.…”
Section: Technical Analysismentioning
confidence: 99%
“…Threat actors make strategic and operational choices known as Tactics, Techniques, and Procedures (TTPs) in their cyber operations. TTPs include the different stages of an attack, such as initial reconnaissance, intrusion, data exfiltration, or system disruption (Goel & Nussbaum, 2021). Attack vectors are the different ways in which attackers can access a target system or network.…”
Section: Tactics Techniques and Procedures (Ttps)mentioning
confidence: 99%
“…The attacker does not leave any proof of their involvement in these attacks. The attackers are called non-state attackers (Goel and Nussbaum, 2021). To name a few, non-state actors include criminal organizations, script kiddies, hacktivists, scammers, and black hat hackers.…”
Section: Research Challenges and Issues In Cyber Securitymentioning
confidence: 99%
“…The rapid digital transition exposes vulnerabilities that are being exploited by cybercriminals [36,37]. Common security incidents include malware infection, ransomware, exploit exploits, improper access to applications, social engineering attacks, and denial of services [38,39].…”
Section: Probability Of Open Ports (Pop)mentioning
confidence: 99%
“…The previous process of knowing how difficult it is to compromise an organization is decisive for an attacker or group of attackers to spend their resources and time. For this reason, all the information that organizations allow to be leaked on the Internet is of vital importance to become a target or not [34,38,39].…”
Section: Prioritization Analysismentioning
confidence: 99%