Under false flag: using technical artifacts for cyber attack attribution
Abstract The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is in the center of interest for nation...
Main Authors: | Florian Skopik, Timea Pahi |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2020-03-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s42400-020-00048-4 |
Similar Items
-
False Sequential Command Attack of Large-Scale Cyber-Physical Systems
by: Yinqiao Xiong, et al.
Published: (2018-09-01) -
Cyber Attacks Detection and Mitigation in SDN Environments
Published: (2018) -
A review of threat modelling approaches for APT-style attacks
by: Matt Tatam, et al.
Published: (2021-01-01) -
Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection
by: Mehran Khosravi, et al.
Published: (2020-01-01) -
Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems
by: Wen Tian, et al.
Published: (2019-09-01)