Attribution in cyberspace: techniques and legal implications

Jawwad A. Shamsi, Sherali Zeadally, Fareha Sheikh, Angelyn Flowers

Research output: Contribution to journalArticlepeer-review

12 Scopus citations

Abstract

Attribution of cybercrimes is significant in limiting the rate of crime as well as in preparing the required level of response. Motivated by this significance, we introduce a level-based approach for achieving attribution. In our proposed approach, attribution consists of three steps: (1) identification of the cyberweapon used; (2) determination of the origin of the attack; and (3) identification of the actual attacker. We conduct an in-depth analysis of recently proposed attribution techniques. Our analysis reveals that indirect methods of attribution are particularly effective when attributing cybercrimes; many of them remain unattributed. We also discuss some of the legal issues pertaining to attribution, and we argue that well-defined international laws for cyberspace along with strong cooperation among governments are needed to track down and punish cybercriminals.

Original languageEnglish
Pages (from-to)2886-2900
Number of pages15
JournalSecurity and Communication Networks
Volume9
Issue number15
DOIs
StatePublished - Oct 1 2016

Bibliographical note

Publisher Copyright:
Copyright © 2016 John Wiley & Sons, Ltd.

Keywords

  • attribution
  • cyberattacks
  • cybercrime
  • cyberlaws
  • denial of service
  • malware

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Attribution in cyberspace: techniques and legal implications'. Together they form a unique fingerprint.

Cite this