Resumen
Attribution of cybercrimes is significant in limiting the rate of crime as well as in preparing the required level of response. Motivated by this significance, we introduce a level-based approach for achieving attribution. In our proposed approach, attribution consists of three steps: (1) identification of the cyberweapon used; (2) determination of the origin of the attack; and (3) identification of the actual attacker. We conduct an in-depth analysis of recently proposed attribution techniques. Our analysis reveals that indirect methods of attribution are particularly effective when attributing cybercrimes; many of them remain unattributed. We also discuss some of the legal issues pertaining to attribution, and we argue that well-defined international laws for cyberspace along with strong cooperation among governments are needed to track down and punish cybercriminals.
| Idioma original | English |
|---|---|
| Páginas (desde-hasta) | 2886-2900 |
| Número de páginas | 15 |
| Publicación | Security and Communication Networks |
| Volumen | 9 |
| N.º | 15 |
| DOI | |
| Estado | Published - oct 1 2016 |
Nota bibliográfica
Publisher Copyright:Copyright © 2016 John Wiley & Sons, Ltd.
ODS de las Naciones Unidas
Este resultado contribuye a los siguientes Objetivos de Desarrollo Sostenible
-
Peace justice and strong institutions
ASJC Scopus subject areas
- Information Systems
- Computer Networks and Communications
Huella
Profundice en los temas de investigación de 'Attribution in cyberspace: techniques and legal implications'. En conjunto forman una huella única.Citar esto
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver