Description |
1 online resource (viii, 91 pages) : illustrations |
Series |
SpringerBriefs in computer science, 2191-5768 |
|
SpringerBriefs in computer science, 2191-5768
|
Contents |
Intro; Acknowledgements; Contents; 1 Introduction; References; 2 Baseline Cyber Attribution Models; 2.1 Introduction; 2.2 Dataset; 2.2.1 DEFCON CTF; 2.2.2 DEFCON CTF Data; 2.2.3 Analysis of CTF Data; 2.3 Baseline Approaches; 2.4 Experimental Results; 2.4.1 Misclassified Samples; 2.4.2 Pruning; 2.5 Conclusions; References; 3 Argumentation-Based Cyber Attribution: The DeLP3E Model; 3.1 Introduction; 3.1.1 Application to the Cyber Attribution Problem; 3.1.2 Structure of the Chapter; 3.2 Technical Preliminaries; 3.2.1 Basic Language; 3.2.2 Environmental Model; 3.2.3 Analytical Model |
|
3.3 The DeLP3E Framework3.3.1 Warranting Scenarios; 3.3.2 Entailment in DeLP3E; 3.4 Consistency and Inconsistency in DeLP3E Programs; 3.5 Case Study: An Application in Cybersecurity; 3.5.1 Model for the Attribution Problem; 3.5.2 Applying Entailment to the Cyber Attribution Problem; 3.6 Conclusions; References; 4 Belief Revision in DeLP3E; 4.1 Introduction; 4.2 Basic Belief Revision; 4.2.1 EM-Based Belief Revision; 4.2.2 AM-Based Belief Revision; 4.2.2.1 Postulates for AM-Based Belief Revision; 4.2.2.2 AM-Based Revision Operators; 4.2.3 Annotation Function-Based Belief Revision |
|
4.2.3.1 Postulates for Revising the Annotation Function4.2.3.2 AF-Based Revision Operators; 4.3 Quantitative Belief Revision Operators; 4.3.1 Towards Quantitative Revision; 4.3.2 Two Building Blocks; 4.3.3 The Class QAFO; 4.3.4 Computational Complexity; 4.3.5 Warranting Formulas; 4.3.6 Outlook: Towards Tractable Computations; 4.4 Conclusions and Future Work; References; 5 Applying Argumentation Models for Cyber Attribution; 5.1 Introduction; 5.2 Baseline Argumentation Model (BM); 5.3 Extended Baseline Model i (EB1); 5.4 Extended Baseline Model ii (EB2); 5.5 Conclusions; References |
|
6 Enhanced Data Collection for Cyber Attribution6.1 Introduction; 6.2 Goals and Design; 6.2.1 Changing Contestant Behavior; 6.2.2 Game Rules; 6.2.3 Infrastructure Design; 6.2.4 Motivating Attribution and Deception; 6.2.5 Validity of Data; 6.3 Conclusion; References; 7 Conclusion |
Summary |
This SpringerBrief discusses how to develop intelligent systems for cyber attribution regarding cyber-attacks. Specifically, the authors review the multiple facets of the cyber attribution problem that make it difficult for "out-of-the-box" artificial intelligence and machine learning techniques to handle. Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and source tracking) and conventional intelligence sources (i.e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence. This SpringerBrief not only lays out the theoretical foundations for how to handle the unique aspects of cyber attribution - and how to update models used for this purpose - but it also describes a series of empirical results, as well as compares results of specially-designed frameworks for cyber attribution to standard machine learning approaches. Cyber attribution is not only a challenging problem, but there are also problems in performing such research, particularly in obtaining relevant data. This SpringerBrief describes how to use capture-the-flag for such research, and describes issues from organizing such data to running your own capture-the-flag specifically designed for cyber attribution. Datasets and software are also available on the companion website |
Bibliography |
Includes bibliographical references |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed February 20, 2018) |
Subject |
Artificial intelligence.
|
|
Computer security
|
|
artificial intelligence.
|
|
Computer security.
|
|
Artificial intelligence.
|
|
COMPUTERS -- General.
|
|
Artificial intelligence
|
|
Computer security
|
Form |
Electronic book
|
Author |
Nunes, Eric, author
|
|
Shakarian, Paulo, author.
|
|
Simari, Gerardo I., author.
|
|
Ruef, Andrew, author.
|
ISBN |
9783319737881 |
|
3319737880 |
|