Abstract
The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community. © 2008 International Federation for Information Processing.
Author supplied keywords
Cite
CITATION STYLE
Hunker, J., Hutchinson, R., & Margulies, J. (2008). Attribution of cyber attacks on process control systems. IFIP International Federation for Information Processing, 290, 87–99. https://doi.org/10.1007/978-0-387-88523-0_7
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.