2015
DOI: 10.1007/978-3-319-14039-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Attribution: An Argumentation-Based Approach

Abstract: Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and source tracking) and conventional intelligence sources (i.e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence. In this paper, we introduce a formal reasoning system called the InCA (Intelligent Cyber Attribution) framework that is designed to aid an analyst in the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…Rule D ′′ 1 cannot be applied. Rule D ′′ 2 is applied, as shown in (14)- (15), to the conflicting pieces of evidence where the reasonings' trust relations apply. Finally, L ′ 1 transforms all third layer formulas into second layer ones:…”
Section: A Detailed Case Study: Attribution Of a Cyber-attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Rule D ′′ 1 cannot be applied. Rule D ′′ 2 is applied, as shown in (14)- (15), to the conflicting pieces of evidence where the reasonings' trust relations apply. Finally, L ′ 1 transforms all third layer formulas into second layer ones:…”
Section: A Detailed Case Study: Attribution Of a Cyber-attackmentioning
confidence: 99%
“…To the best of our knowledge, the only attempt at using belief revision during cyber-attacks' investigations is [15,16], where a probabilistic structure argumentation framework is used to analyze contradictory and uncertain data. Our procedure does not deal with probabilities, but with preferences between sources and reasoning rules.…”
Section: Related Work and Concluding Remarksmentioning
confidence: 99%
“…In a similar fashion, probabilistic argumentation frameworks can be divided into those that arise from extending abstract models [69,70,71] and others based on incorporating probabilities in structured frameworks-the earliest such works appeared almost two decades ago [72,73], followed by a period of inactivity and a recent resurgence of interest in the topic [74,9,75]. Clearly, our work is closest in spirit to the latter, since labels can be seen as a generalization of probability values associated with items in the knowledge base-the generalization is not, however, a complete subsumption since the algebra in this case would simply model a probabilistic space; the modeling of the corresponding probability distribution needs to reside elsewhere, as done in the works mentioned above.…”
Section: Fuzzy and Probabilistic Frameworkmentioning
confidence: 99%
“…In a general sense, argumentation can be defined as the study of the interaction among arguments for and against conclusions, with the purpose of determining which conclusions are acceptable in order to use such claims to resolve real-world problems. Argumentation tools are applied in many areas such as legal reasoning [1,2], intelligent web search [3,4], recommender systems [5,6], autonomous agents and multiagent systems [7,8], cyber-security [9], and many others [10,11,12].…”
Section: Introductionmentioning
confidence: 99%
“…Shakarian et al [7] described a cyber attribution system [8], [9] that takes into consideration different data sources and uses MAS to reason about the origin of an attack through the use of agent reasoning. The system uses information gathered about the attack as well as information gathered from a wide range of military sources to reason in-depth about the attribution of an attack.…”
Section: Related Researchmentioning
confidence: 99%