Knowledge Base Wiki

Search for LIMS content across all our Wiki Knowledge Bases.

Type a search term to find related articles by LIMS subject matter experts gathered from the most trusted and dynamic collaboration tools in the laboratory informatics industry.

Add links

In the area of computer security, cyber attribution is an attribution of cybercrime, i.e., finding who perpetrated a cyberattack. Uncovering a perpetrator may give insights into various security issues, such as infiltration methods, communication channels, etc., and may help in enacting specific countermeasures. Cyber attribution is a costly endeavor requiring considerable resources and expertise in cyber forensic analysis.[1][2]

Nissim Ben Saadon argues that the task of cyber attribution makes sense for major organizations: government agencies and major businesses in sensitive domains, such as healthcare and state infrastructures. However most small and medium businesses (SMB) gain little in "postmortem" identification of perpetrators. In BEn Saadon's opinion, it is unlikely that a particular SMB was specifically targeted; rather the incident was a crime of opportunity, exploiting a detected vulnerability, and with limited resources it is wiser to spend it on identifying the vulnerability in question and eliminating it.[1]

For governments and other major players dealing with cybercrime would require not only technical solutions, but legal and political ones as well, and for the latter ones cyber attribution is crucial.[2]: xvii 

Attributing a cyberattack is difficult, and of limited interest to companies that are targeted by cyberattacks. In contrast, secret services often have a compelling interest in finding out whether a state is behind the attack.[3] A further challenge in attribution of cyberattacks is the possibility of a false flag attack, where the actual perpetrator makes it appear that someone else caused the attack.[3] Every stage of the attack may leave artifacts, such as entries in log files, that can be used to help determine the attacker's goals and identity.[4] In the aftermath of an attack, investigators often begin by saving as many artifacts as they can find,[5] and then try to determine the attacker.[6]

See also

References

  1. ^ a b Johnson, Emily (2020). "Cyber Attribution: Technical and Legal Challenges". Computers & Security. 95. doi:10.1093/ejil/chaa057. Retrieved October 8, 2024.
  2. ^ a b Yannakogeorgos, Panayotis A. (2017). Strategies for Resolving the Cyber Attribution Challenge (PDF) (Report). Maxwell Air Force Base, Alabama: Air University Press. Retrieved October 8, 2024.
  3. ^ a b Skopik & Pahi 2020, p. 1.
  4. ^ Skopik & Pahi 2020, pp. 1, 6.
  5. ^ Skopik & Pahi 2020, p. 12.
  6. ^ Skopik & Pahi 2020, p. 16.

Further reading

  • Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Artificial Intelligence Tools for Cyber Attribution, 2018, ISBN 3319737872