2015
DOI: 10.1093/cybsec/tyv003
|View full text |Cite
|
Sign up to set email alerts
|

Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0
6

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(45 citation statements)
references
References 46 publications
0
39
0
6
Order By: Relevance
“…There are significant challenges in assessing possible threats and in keeping such assessments accurate, given advances in technologies and in their uses, such as the evolving "dark net" (Fachkha & Debbabi, 2016;Lacson & Jones, 2016), and the growing offensive capabilities of a few countries and of groups of individuals, including terrorists (Liff, 2012;Lindsay, 2015), plus a great many everyday cybercriminals (Akamai, 2016;Cisco, 2017). South Africa has been the country most often attacked in Africa (Wolfpack, 2013;TMG Digital, 2016;Van Heerden, Von Soms, & Mooi, 2016), with an estimated cost in 2014 of ZAR5.8 billion (Fripp, 2014).…”
Section: Governance Of Cybersecurity -The Case Of South Africamentioning
confidence: 99%
“…There are significant challenges in assessing possible threats and in keeping such assessments accurate, given advances in technologies and in their uses, such as the evolving "dark net" (Fachkha & Debbabi, 2016;Lacson & Jones, 2016), and the growing offensive capabilities of a few countries and of groups of individuals, including terrorists (Liff, 2012;Lindsay, 2015), plus a great many everyday cybercriminals (Akamai, 2016;Cisco, 2017). South Africa has been the country most often attacked in Africa (Wolfpack, 2013;TMG Digital, 2016;Van Heerden, Von Soms, & Mooi, 2016), with an estimated cost in 2014 of ZAR5.8 billion (Fripp, 2014).…”
Section: Governance Of Cybersecurity -The Case Of South Africamentioning
confidence: 99%
“…Attribution from an economic perspective was studied by ref. 33, concluding that deterrence is effective for high-value targets and that denial and defense are a wiser investment for lower-value targets. This work provides a formal model that includes both technical and nontechnical aspects of cyber attribution.…”
Section: Significancementioning
confidence: 99%
“…First, as Sheldon observes, Battacks in cyberspace occur at great speed…putting defenses under immense pressure, as an attacker has to be successful only once, whereas the defender has to be successful all of the time^ (Sheldon 2011, 98). Second, the prospect of launching attacks with relative anonymity (and therefore impunity) lowers the expected cost of offensive strategies in cyberspace (see Sheldon 2011, 98;Lindsay 2015). Third, physical distance is relatively inconsequential in the virtual world.…”
Section: The Cult Of the (Cyber) Offensivementioning
confidence: 99%
“…An important aspect of an effective ICWC would therefore be to institute some form of collective mechanism to facilitate faster and more reliable attribution of cyberattacks. As already discussed, whereas pessimism has long reigned regarding attribution in cyberspace, many experts now take the view that-given adequate time and resources-reliable attribution of cyber-attacks is generally possible, at least when it comes to large-scale attacks against critical infrastructure (for an insightful discussion, see Lindsay 2015). Nevertheless, reliable attribution is both time consuming and costly.…”
Section: Collective Attributionmentioning
confidence: 99%