Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks

被引:0
|
作者
Sharma, Munish [1 ,2 ]
机构
[1] Jawaharlal Nehru Univ, Ctr East Asian Studies, New Delhi, India
[2] Manohar Parrikar Inst Def Studies & Analyses MP I, Strateg Technol Ctr, New Delhi, India
关键词
D O I
10.1080/09700161.2020.1870268
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model. Bayesian Belief Networks represent relationships between variables or multiple events and they are used to draw inference or estimate the probability to help decision-making under the conditions of uncertainty.
引用
收藏
页码:18 / 37
页数:20
相关论文
共 50 条
  • [1] Bayesian-Poisson Based Modeling of Cyber Attacks in Cloud Computing Networks
    Zimba, Aaron
    Wang, Zhaoshun
    Chen, Hongsong
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 316 - 320
  • [2] The Attribution Problem and Cyber Armed Attacks
    Finlay, Lorraine
    Payne, Christian
    AJIL UNBOUND, 2019, 113 : 202 - 206
  • [3] Edge Aggregation Based Bayesian Modeling of Cyber Attacks in Hypervisor-Enabled IaaS Cloud Networks
    Zimba, Aaron
    Chen Hongsong
    Wang Zhaoshun
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1312 - 1317
  • [4] Risk assessment of smart grids under cyber-physical attacks using Bayesian networks
    AlMajali A.
    Wadhawan Y.
    Saadeh M.S.
    Shalalfeh L.
    Neuman C.
    International Journal of Electronic Security and Digital Forensics, 2020, 12 (04): : 424 - 436
  • [5] A Taxonomy of Technical Attribution Techniques for Cyber Attacks
    Nicholson, Andrew
    Watson, Tim
    Norris, Peter
    Duffy, Alistair
    Isbell, Roy
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 188 - 197
  • [7] ATTRIBUTION OF CYBER ATTACKS ON PROCESS CONTROL SYSTEMS
    Hunker, Jeffrey
    Hutchinson, Robert
    Margulies, Jonathan
    CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 87 - +
  • [8] Risk assessment of smart grids under cyber-physical attacks using Bayesian networks
    AlMajali, Anas
    Wadhawan, Yatin
    Saadeh, Mahmood S.
    Shalalfeh, Laith
    Neuman, Clifford
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2020, 12 (04) : 357 - 385
  • [9] Rational Irrationality: Modeling Climate Change Belief Polarization Using Bayesian Networks
    Cook, John
    Lewandowsky, Stephan
    TOPICS IN COGNITIVE SCIENCE, 2016, 8 (01) : 160 - 179
  • [10] Environmental monitoring, modeling, and management and Bayesian Belief Networks
    Kemblowski, M
    Johnson, PC
    DEVELOPMENT AND APPLICATION OF COMPUTER TECHNIQUES TO ENVIRONMENTAL STUDIES VIII, 2000, 4 : 133 - 142