Techniques for Cyber Attack Attribution

Author(s):  
David A. Wheeler ◽  
Gregory N. Larsen
Author(s):  
Nikolaos Pitropakis ◽  
Emmanouil Panaousis ◽  
Alkiviadis Giannakoulias ◽  
George Kalpakis ◽  
Rodrigo Diaz Rodriguez ◽  
...  

Author(s):  
Char Sample ◽  
Jennifer Cowley ◽  
Jonathan Z. Bakdash

Technical advances in cyber-attack attribution continues to show incremental improvement. A growing interest in the role of the human in perception management, and decision-making suggest that other aspects of human cognition may be able to help inform attribution, and other aspects of cyber security such as defending and training. Values shape behaviors and cultural values set norms for groups of people. Therefore, they should be considered when modeling behaviors. The lack of studies in this area requires exploration and foundational work to learn the limits of this area of research. This chapter highlights some of the findings of some of the recent studies.


Author(s):  
Char Sample ◽  
Jennifer Cowley ◽  
Jonathan Z. Bakdash

Technical advances in cyber-attack attribution continues to show incremental improvement. A growing interest in the role of the human in perception management, and decision-making suggest that other aspects of human cognition may be able to help inform attribution, and other aspects of cyber security such as defending and training. Values shape behaviors and cultural values set norms for groups of people. Therefore, they should be considered when modeling behaviors. The lack of studies in this area requires exploration and foundational work to learn the limits of this area of research. This chapter highlights some of the findings of some of the recent studies.


2020 ◽  
Vol 47 (1) ◽  
pp. 19-26
Author(s):  
Min-ho Lee ◽  
Chang-wook Park ◽  
Wan-ju Kim ◽  
Jae-sung Lim

Sign in / Sign up

Export Citation Format

Share Document