Attribution in cyberspace: techniques and legal implications

11Citations
Citations of this article
77Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attribution of cybercrimes is significant in limiting the rate of crime as well as in preparing the required level of response. Motivated by this significance, we introduce a level-based approach for achieving attribution. In our proposed approach, attribution consists of three steps: (1) identification of the cyberweapon used; (2) determination of the origin of the attack; and (3) identification of the actual attacker. We conduct an in-depth analysis of recently proposed attribution techniques. Our analysis reveals that indirect methods of attribution are particularly effective when attributing cybercrimes; many of them remain unattributed. We also discuss some of the legal issues pertaining to attribution, and we argue that well-defined international laws for cyberspace along with strong cooperation among governments are needed to track down and punish cybercriminals. Copyright © 2016 John Wiley & Sons, Ltd.

References Powered by Scopus

Stuxnet: Dissecting a cyberwarfare weapon

1472Citations
N/AReaders
Get full text

A survey on automated dynamic malware-analysis techniques and tools

649Citations
N/AReaders
Get full text

Onion routing for anonymous and private internet connections

607Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism

15Citations
N/AReaders
Get full text

Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country

8Citations
N/AReaders
Get full text

NoSQL databases: Forensic attribution implications

8Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Shamsi, J. A., Zeadally, S., Sheikh, F., & Flowers, A. (2016). Attribution in cyberspace: techniques and legal implications. In Security and Communication Networks (Vol. 9, pp. 2886–2900). John Wiley and Sons Inc. https://doi.org/10.1002/sec.1485

Readers over time

‘16‘17‘18‘19‘20‘21‘22‘23‘2405101520

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 39

89%

Researcher 3

7%

Professor / Associate Prof. 1

2%

Lecturer / Post doc 1

2%

Readers' Discipline

Tooltip

Computer Science 31

62%

Social Sciences 13

26%

Engineering 4

8%

Chemistry 2

4%

Save time finding and organizing research with Mendeley

Sign up for free
0