An Exploratory Study on Artifacts for Cyber Attack Attribution Considering False Flag: Using Delphi and AHP Methods

When a security incident by an attacker occurs in the cyber world, an analyst analyzes the artifacts collected in the incident area. The findings from the analysis of this incident utilize to track hackers or create security plans for the organization. However, if an analyst analyzes fabricated trac...

Full description

Bibliographic Details
Main Authors: Soonil Hwang, Tae-Sung Kim
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10184002/