G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR2081
来源IDRR-2081-MS
Stateless Attribution: Toward International Accountability in Cyberspace
John S. Davis II; Benjamin Boudreaux; Jonathan W. Welburn; Jair Aguirre; Cordaye Ogletree; Geoffrey McGovern; Michael S. Chase
发表日期2017-06-02
出版年2017
语种英语
结论

Cyber Attribution Efforts Lack Uniformity and Credibility

  • Analysis of recent cases indicates that the practice of attribution has been diffuse and discordant, with no standard methodology used in the investigations to assess evidence, nor a universal confidence metric for reaching a finding.
  • In several cases, investigations were performed but no formal attribution finding was made public by the investigative entity or victim. Further, public statements of attribution have been met with suspicion, confusion, and a request for greater transparency about the investigation and the evidential basis.

Challenges in Cyber Attribution

  • The first challenge concerns the difficulty of reaching a cyber attribution finding. Technical, political, and all-source indicators are all tools used in determining attribution, and usually are used in some combination.
  • A second cyber attribution challenge concerns the issue of persuasively communicating a finding to an intended audience. Credibility hinges on several factors: strong evidence, demonstration of the requisite knowledge and skills for reaching a correct conclusion, a track record of accuracy and precision, a reputation for objective and unbiased analysis, and a transparent methodology that includes an independent review process.
  • Effective cyber attribution investigations will reflect these considerations and achieve credibility in the eyes of the of the target audience.
摘要

The public attribution of a malicious cyber incident consists of identifying the responsible party behind the activity. A cyber attribution finding is a necessary prerequisite for holding actors accountable for malicious activity. Recently, several cyber incidents with geopolitical implications and the attribution findings associated with those incidents have received high-profile press coverage. Many segments of the general public disputed and questioned the credibility of the declared attributions. This report reviews the state of cyber attribution and examines alternative options for producing standardized and transparent attribution that may overcome concerns about credibility. In particular, this exploratory work considers the value of an independent, global organization whose mission consists of investigating and publicly attributing major cyber attacks.

目录
  • Chapter One

    Introduction

  • Chapter Two

    A Review of Notable Cyber Attacks

  • Chapter Three

    Cyber Attribution in Practice

  • Chapter Four

    Toward a Global Consortium for Cyber Attribution

  • Chapter Five

    The Core Features of a Cyber Attribution Organization

  • Chapter Six

    Conclusion

主题Cyber Warfare ; Cybercrime ; Cybersecurity ; Global Security ; The Internet
URLhttps://www.rand.org/pubs/research_reports/RR2081.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/523311
推荐引用方式
GB/T 7714
John S. Davis II,Benjamin Boudreaux,Jonathan W. Welburn,et al. Stateless Attribution: Toward International Accountability in Cyberspace. 2017.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR2081.pdf(637KB)智库出版物 限制开放CC BY-NC-SA浏览
x1547586412784.jpg.p(4KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[John S. Davis II]的文章
[Benjamin Boudreaux]的文章
[Jonathan W. Welburn]的文章
百度学术
百度学术中相似的文章
[John S. Davis II]的文章
[Benjamin Boudreaux]的文章
[Jonathan W. Welburn]的文章
必应学术
必应学术中相似的文章
[John S. Davis II]的文章
[Benjamin Boudreaux]的文章
[Jonathan W. Welburn]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR2081.pdf
格式: Adobe PDF
文件名: x1547586412784.jpg.pagespeed.ic.ufccFNCClD.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。