IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Indirect Attribution in Cyberspace

Indirect Attribution in Cyberspace
View Sample PDF
Author(s): Robert Layton (Federation University, Australia)and Paul A. Watters (Massey University, New Zealand)
Copyright: 2015
Pages: 17
Source title: Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal)and Irene Maria Portela (Polytechnic Institute of Cávado and Ave, Portugal)
DOI: 10.4018/978-1-4666-6324-4.ch016

Purchase

View Indirect Attribution in Cyberspace on the publisher's website for pricing and purchasing information.

Abstract

We are now in an era of cyberconflict, where nation states, in addition to private entities and individual actors, are attacking each other through Internet-based mechanisms. This incorporates cyberespionage, cybercrime, and malware attacks, with the end goal being intellectual property, state secrets, identity information, and monetary gain. Methods of deterring cybercrime ultimately require effective attribution; otherwise, the threat of consequences for malicious online behaviour will be diminished. This chapter reviews the state of the art in attribution in cyberspace, arguing that due to increases in the technical capability of the most recent advances in cyberconflict, models of attribution using network traceback and explicit identifiers (i.e. direct models) are insufficient build trustworthy models. The main cause of this is the ability of adversaries to obfuscate information and anonymise their attacks from direct attribution. Indirect models, in which models of attacks are built based on feature types and not explicit features, are more difficult to obfuscate and can lead to more reliable methods. There are some issues to overcome with indirect models, such as the complexity of models and the variations in effectiveness, which present an interesting and active field of research.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom