Abstract | ||
---|---|---|
The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important First step towards a more complete attribution methodology for the control systems community. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-0-387-88523-0_7 | CRITICAL INFRASTRUCTURE PROTECTION II |
Keywords | Field | DocType |
Process control systems, cyber attacks, attack attribution | Computer security,Attribution,Process control,Engineering,Distributed computing | Conference |
Volume | ISSN | Citations |
290 | 1571-5736 | 1 |
PageRank | References | Authors |
0.37 | 0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jeffrey Hunker | 1 | 68 | 7.44 |
Robert Hutchinson | 2 | 1 | 0.37 |
Jonathan Margulies | 3 | 1 | 0.37 |