Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks

被引:0
|
作者
Sharma, Munish [1 ,2 ]
机构
[1] Jawaharlal Nehru Univ, Ctr East Asian Studies, New Delhi, India
[2] Manohar Parrikar Inst Def Studies & Analyses MP I, Strateg Technol Ctr, New Delhi, India
关键词
D O I
10.1080/09700161.2020.1870268
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model. Bayesian Belief Networks represent relationships between variables or multiple events and they are used to draw inference or estimate the probability to help decision-making under the conditions of uncertainty.
引用
收藏
页码:18 / 37
页数:20
相关论文
共 50 条
  • [21] Continuous process improvement using Bayesian Belief Networks
    Lewis, NDC
    COMPUTERS & INDUSTRIAL ENGINEERING, 1999, 37 (1-2) : 449 - 452
  • [22] Software quality classification using Bayesian belief networks
    Khoshgoftaar, Taghi M.
    Dong, Yuhong
    Szabo, Robert M.
    ELEVENTH ISSAT INTERNATIONAL CONFERENCE RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2005, : 106 - 110
  • [23] Belief update in Bayesian networks using uncertain evidence
    Pan, Rong
    Peng, Yun
    Ding, Zhongli
    ICTAI-2006: EIGHTEENTH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, : 441 - +
  • [24] Hardware/software partitioning using Bayesian belief networks
    Olson, John T.
    Rozenblit, Jerzy W.
    Talarico, Claudio
    Jacak, Witold
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2007, 37 (05): : 655 - 668
  • [25] Continuous process improvement using Bayesian Belief Networks
    Lewis, Nigel D.C.
    Computers and Industrial Engineering, 1999, 37 (01): : 449 - 452
  • [26] Evaluation of Naive Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks
    Ismail, Shereen
    Reza, Hassan
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 283 - 289
  • [27] Criminals and Cyber Attacks: The Missing Link between Attribution and Deterrence
    Guitton, Clement
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2012, 6 (02): : 1030 - 1043
  • [28] Outlier detection in wireless sensor networks using Bayesian belief networks
    Janakiram, D.
    Reddy, Adi Mallikarjuna
    Kumar, A. V. U. Phani
    2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 552 - +
  • [29] Behaviour classification of cyber attacks using convolutional neural networks
    Lin, Wen-Hui
    Wang, Ping
    Lin, Hsiao-Chung
    Wu, Bao-Hua
    Tsai, Jeng-Ying
    Journal of Computers (Taiwan), 2021, 32 (01): : 65 - 82
  • [30] Modeling Land-Use Decision Behavior with Bayesian Belief Networks
    Aalders, Inge
    ECOLOGY AND SOCIETY, 2008, 13 (01):