Abstract
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is know. In this work, we use various classification techniques to identify the culprit in a cyberattack and find that deceptive activities account for the majority of misclassified samples. We also explore several heuristics to alleviate some of the misclassification caused by deception.
Original language | English (US) |
---|---|
Title of host publication | Cyber Deception |
Subtitle of host publication | Building the Scientific Foundation |
Publisher | Springer International Publishing |
Pages | 149-165 |
Number of pages | 17 |
ISBN (Electronic) | 9783319326993 |
ISBN (Print) | 9783319326979 |
DOIs | |
State | Published - Jan 1 2016 |
ASJC Scopus subject areas
- Computer Science(all)