基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
The attribution of cyber attacks is often neglected.The consensus still is that little can be done to prosecute the perpetrators-and unfortunately,this might be right in many cases.What is however only of limited interest for the private industry is in the center of interest for nation states.Investigating if an attack was carried out in the name of a nation state is a crucial task for secret services.Many methods,tools and processes exist for network-and computer forensics that allow the collection of traces and evidences.They are the basis to associate adversarial actions to threat actors.However,a serious problem which has not got the appropriate attention from research yet,are false flag campaigns,cyber attacks which apply covert tactics to deceive or misguide attribution attempts-either to hide traces or to blame others.In this paper we provide an overview of prominent attack techniques along the cyber kill chain.We investigate traces left by attack techniques and which questions in course of the attribution process are answered by investigating these traces.Eventually,we assess how easily traces can be spoofed and rate their relevancy with respect to identifying false flag campaigns.
推荐文章
期刊_丙丁烷TDLAS测量系统的吸收峰自动检测
带间级联激光器
调谐半导体激光吸收光谱
雾剂检漏 中红外吸收峰 洛伦兹光谱线型
期刊_联合空间信息的改进低秩稀疏矩阵分解的高光谱异常目标检测
高光谱图像
异常目标检测 低秩稀疏矩阵分解 稀疏矩阵 残差矩阵
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Under false flag: using technical artifacts for cyber attack attribution
来源期刊 网络空间安全科学与技术(英文版) 学科
关键词 Actor attribution Advanced persistent threats Technical indicators False flag campaigns
年,卷(期) 2020,(1) 所属期刊栏目
研究方向 页码范围 65-84
页数 20页 分类号
字数 语种 中文
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (13)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2005(1)
  • 参考文献(1)
  • 二级参考文献(0)
2006(1)
  • 参考文献(1)
  • 二级参考文献(0)
2011(2)
  • 参考文献(2)
  • 二级参考文献(0)
2012(1)
  • 参考文献(1)
  • 二级参考文献(0)
2013(1)
  • 参考文献(1)
  • 二级参考文献(0)
2014(2)
  • 参考文献(2)
  • 二级参考文献(0)
2015(3)
  • 参考文献(3)
  • 二级参考文献(0)
2016(1)
  • 参考文献(1)
  • 二级参考文献(0)
2018(1)
  • 参考文献(1)
  • 二级参考文献(0)
2020(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
Actor attribution
Advanced persistent threats
Technical indicators
False flag campaigns
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
网络空间安全科学与技术(英文版)
季刊
2096-4862
10-1537/T
eng
出版文献量(篇)
54
总下载数(次)
0
总被引数(次)
0
论文1v1指导