On the feasibility of real-time cyber attack attribution on the Internet
Title | On the feasibility of real-time cyber attack attribution on the Internet |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Wang, Xinyuan |
Publisher | IEEE |
ISBN Number | 978-1-5090-3781-0 |
Keywords | attribution, composability, Human Behavior, Metrics, pubcrawl |
Abstract | The capability to reliably and accurately identify the attacker has long been believed as one of the most effective deterrents to an attack. Ideally, the attribution of cyber attack should be automated from the attack target all the way toward the attack source on the Internet in real-time. Real-time, network-wide attack attribution, however, is every challenging, and many people have doubted whether it is feasible to have practical attack attribution on the Internet. In this paper, we look into the problem, challenges of real-time attack attribution on the Internet, and analyze what it takes to have the real-time attack attribution on the Internet. We show that it is indeed feasible and practical to attribute certain cyber attacks on the Internet in real-time. We build such a real-time attack attribution system upon the malware immunization and packet flow watermarking techniques we have developed. We demonstrate the unprecedented real-time attack attribution capability via live experiments on the Internet and Tor nodes all over the world. |
URL | http://ieeexplore.ieee.org/document/7795341/ |
DOI | 10.1109/MILCOM.2016.7795341 |
Citation Key | wang_feasibility_2016 |