Attribution Across Cyber Attack Types: Network Intrusions and Information Operations

The objective of this paper is to articulate the problem of attribution in cyber warfare incidents, including, surveillance, data theft, espionage, and misinformation campaigns. As the stakes increase, concerted efforts are being made by intelligence and law enforcement agencies to identify the perp...

Full description

Bibliographic Details
Main Authors: Sanjay Goel, Brian Nussbaum
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Open Journal of the Communications Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9411871/
_version_ 1819105555179896832
author Sanjay Goel
Brian Nussbaum
author_facet Sanjay Goel
Brian Nussbaum
author_sort Sanjay Goel
collection DOAJ
description The objective of this paper is to articulate the problem of attribution in cyber warfare incidents, including, surveillance, data theft, espionage, and misinformation campaigns. As the stakes increase, concerted efforts are being made by intelligence and law enforcement agencies to identify the perpetrators with much painstaking effort. Attribution tools and techniques for malicious activities on the Internet are still nascent, relying mainly on technical measurements, the provenance of malicious code, and non-technical assessments of attack and attacker characteristics to link attack activities to individuals or groups. Attribution of attacks is typically done through a burdensome manual process that relies on both technical analysis and ground intelligence. As a result, this cumbersome and laborious process of attribution is primarily reserved for the most egregious cyber attack cases and those conducted against well resourced organizations. Over time, our attribution abilities have improved, however, this improvement is a two-edged sword: as attribution capabilities improve, Internet privacy is increasingly diluted. This paper discusses attribution for two vastly different types of attacks that are central to cyber conflict today: network intrusions and social bot-led misinformation campaigns. The paper discusses the state of the art regarding attribution abilities across both types of attack, provides recommendations for improved attribution, and lays out future research directions.
first_indexed 2024-12-22T02:24:06Z
format Article
id doaj.art-674e247662d643b59b961e1e55930cfa
institution Directory Open Access Journal
issn 2644-125X
language English
last_indexed 2024-12-22T02:24:06Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Communications Society
spelling doaj.art-674e247662d643b59b961e1e55930cfa2022-12-21T18:42:03ZengIEEEIEEE Open Journal of the Communications Society2644-125X2021-01-0121082109310.1109/OJCOMS.2021.30745919411871Attribution Across Cyber Attack Types: Network Intrusions and Information OperationsSanjay Goel0https://orcid.org/0000-0002-7164-8395Brian Nussbaum1https://orcid.org/0000-0002-2077-9379School of Business, University at Albany, State University of New York, Albany, NY, USACollege of Emergency Preparedness, Homeland Security and Cybersecurity, University at Albany, State University of New York, Albany, NY, USAThe objective of this paper is to articulate the problem of attribution in cyber warfare incidents, including, surveillance, data theft, espionage, and misinformation campaigns. As the stakes increase, concerted efforts are being made by intelligence and law enforcement agencies to identify the perpetrators with much painstaking effort. Attribution tools and techniques for malicious activities on the Internet are still nascent, relying mainly on technical measurements, the provenance of malicious code, and non-technical assessments of attack and attacker characteristics to link attack activities to individuals or groups. Attribution of attacks is typically done through a burdensome manual process that relies on both technical analysis and ground intelligence. As a result, this cumbersome and laborious process of attribution is primarily reserved for the most egregious cyber attack cases and those conducted against well resourced organizations. Over time, our attribution abilities have improved, however, this improvement is a two-edged sword: as attribution capabilities improve, Internet privacy is increasingly diluted. This paper discusses attribution for two vastly different types of attacks that are central to cyber conflict today: network intrusions and social bot-led misinformation campaigns. The paper discusses the state of the art regarding attribution abilities across both types of attack, provides recommendations for improved attribution, and lays out future research directions.https://ieeexplore.ieee.org/document/9411871/Attributioncyber attacksmalicious social botscyber warfare
spellingShingle Sanjay Goel
Brian Nussbaum
Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
IEEE Open Journal of the Communications Society
Attribution
cyber attacks
malicious social bots
cyber warfare
title Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
title_full Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
title_fullStr Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
title_full_unstemmed Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
title_short Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
title_sort attribution across cyber attack types network intrusions and information operations
topic Attribution
cyber attacks
malicious social bots
cyber warfare
url https://ieeexplore.ieee.org/document/9411871/
work_keys_str_mv AT sanjaygoel attributionacrosscyberattacktypesnetworkintrusionsandinformationoperations
AT briannussbaum attributionacrosscyberattacktypesnetworkintrusionsandinformationoperations