DOI: 10.31274/etd-180810-2217
|View full text |Cite
|
Sign up to set email alerts
|

Cyberprints: Identifying Cyber Attackers by Feature Analysis

Abstract: Reaching this point in my education is hardly something for which I can claim the credit. For the past twenty-six years I have been encouraged, cared for, counseled, and educated by many truly amazing people. To list them all would require much more space than can be allotted here. In that way, this is both the easiest and hardest part of this document to write. However, I wish to highlight the following people who have stood out as enduring influences and to whom I credit any past or future successes otherwis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0
1

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 34 publications
0
4
0
1
Order By: Relevance
“…Attack characteristics (such as attack potentiality/probability) are defined on the base of attack graphs [10]. Attacker parameters are related to possible attackers and are considered in [3,5,10,18]. Integral (system) characteristics involve features that define common security estimations [5,7,13,14].…”
Section: Related Workmentioning
confidence: 99%
“…Attack characteristics (such as attack potentiality/probability) are defined on the base of attack graphs [10]. Attacker parameters are related to possible attackers and are considered in [3,5,10,18]. Integral (system) characteristics involve features that define common security estimations [5,7,13,14].…”
Section: Related Workmentioning
confidence: 99%
“…Security metrics are an important element of the security evaluation system. From the system security level point of view a set of security metrics can be outlined: integral metrics of the common security level of system, metrics that define topological characteristics, malefactor characteristics and attack characteristics [3,19,32,34,35,37].…”
Section: Related Workmentioning
confidence: 99%
“…In [10] calculation of the risk level on the base of the malefactor behavior is proposed. In some other papers, for example, in [5], attack attribution metrics are considered (the concrete actors involved, equipment and tools used, geographic position, motives, etc. ).…”
Section: Related Workmentioning
confidence: 99%