首页> 外文会议>European Conference on Cyber Warfare and Security >Cyber Attribution 2.0: Capture the False Flag
【24h】

Cyber Attribution 2.0: Capture the False Flag

机译:网络归因2.0:捕获错误标志

获取原文

摘要

In times, where hacking back is increasingly considered as a legitimate reaction to cyber attacks against nation states, misattribution may undermine a state's credibility and lead to political differences. Cyber attribution at this level must deliver reliable results. In recent years, threat intelligence services have often raised concerns regarding the reliability of attribution, and repeatedly pointed out the possibility of false flag operations. The intention of false flag campaigns is not necessarily to trick intelligence services but also to form public opinion. Unfortunately, there is a lack of a reliable approach that deals with the interdisciplinary challenges of cyber attribution. Additionally, there is a lack of concepts designed to deal with possible false flag operations on the technical side (e.g. manipulating digital evidences) and socio-political side (e.g. distributing fake news). Therefore, we propose a novel concept, the Cyber Attribution Model (CAM) to address these aspects. The model is divided into two closely interacting parts: Cyber Attack Investigation and Cyber Threat Actor Profiling. The scope of the CAM is mainly on professional and organized cyber attacks, such as espionage or APT campaigns, and designed for application in national cyber security centres. This paper presents further a literature research and the attribution model, (1) which is adjusted to today's challenges resulting from the information war, such as false flag operations, and (2) which supports security experts - from technical analysts to intelligence services - to master the attribution process on all levels. Finally, we demonstrate the application of the Cyber Attribution Model in context of a real-world scenario.
机译:在次数中,在攻击越来越多地被视为对国家攻击对国家国家的合法反应时,误操作可能会破坏国家的信誉并导致政治差异。此级别的网络归属必须提供可靠的结果。近年来,威胁情报服务经常提出了关于归属可靠性的担忧,并反复指出虚假标志操作的可能性。虚假旗帜运动的意图不一定要欺骗情报服务,也不一定能够形成舆论。不幸的是,缺乏可靠的方法,涉及网络归属的跨学科挑战。此外,缺乏旨在处理技术方面可能的错误标志操作的概念(例如,操纵数字证据)和社会政治方面(例如,分发假新闻)。因此,我们提出了一种新颖的概念,网络归属模型(CAM)来解决这些方面。该模型分为两个紧密的互动部分:网络攻击调查和网络威胁演员分析。凸轮的范围主要是专业和有组织的网络攻击,如间谍或APT运动,并为国家网络安全中心的应用而设计。本文介绍了文献研究和归因模型,(1)被调整为今天的信息战,例如虚假标志运营,(2)支持安全专家 - 从技术分析师到智力服务掌握所有级别的归因过程。最后,我们展示了网络归属模型在真实情景背景下的应用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号