An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks

04/30/2019
by   Erisa Karafili, et al.
0

We expect an increase in frequency and severity of cyber-attacks that comes along with the need of efficient security countermeasures. The process of attributing a cyber-attack helps in constructing efficient and targeted mitigative and preventive security measures. In this work, we propose an argumentation-based reasoner (ABR) that helps the analyst during the analysis of forensic evidence and the attribution process. Given the evidence collected from the cyber-attack, our reasoner helps the analyst to identify who performed the attack and suggests the analyst where to focus further analyses by giving hints of the missing evidence, or further investigation paths to follow. ABR is the first automatic reasoner that analyzes and attributes cyber-attacks by using technical and social evidence, as well as incomplete and conflicting information. ABR was tested on realistic cyber-attacks cases.

READ FULL TEXT
research
05/01/2017

Argumentation-based Security for Social Good

The increase of connectivity and the impact it has in every day life is ...
research
11/13/2017

A Case Study of the 2016 Korean Cyber Command Compromise

On October 2016 the South Korean cyber military unit was the victim of a...
research
04/27/2014

An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare

Attributing a cyber-operation through the use of multiple pieces of tech...
research
07/07/2016

Argumentation Models for Cyber Attribution

A major challenge in cyber-threat analysis is combining information from...
research
04/26/2018

A Formal Approach to Analyzing Cyber-Forensics Evidence

The frequency and harmfulness of cyber-attacks are increasing every day,...
research
03/31/2021

Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations

The number of cyber attacks has increased tremendously in the last few y...
research
07/08/2020

Agile Approach for IT Forensics Management

The forensic investigation of cyber attacks and IT incidents is becoming...

Please sign up or login with your details

Forgot password? Click here to reset