01.12.2012 Views

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ficient to disc<strong>on</strong>nect <str<strong>on</strong>g>the</str<strong>on</strong>g> server that is <str<strong>on</strong>g>the</str<strong>on</strong>g> target <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> DoS attack. When<br />

prosecuting an attack, adversaries must always c<strong>on</strong>tend with limited resources<br />

and time. In order to integrate cyber operati<strong>on</strong>s in c<strong>on</strong>structive<br />

simulati<strong>on</strong>s with a measure <str<strong>on</strong>g>of</str<strong>on</strong>g> realism, <str<strong>on</strong>g>the</str<strong>on</strong>g> paper will discuss a mechanism<br />

to limit <str<strong>on</strong>g>the</str<strong>on</strong>g> cyber attacks available to an attacker in terms <str<strong>on</strong>g>of</str<strong>on</strong>g> available resources<br />

and time. The approach will also introduce <str<strong>on</strong>g>the</str<strong>on</strong>g> c<strong>on</strong>cept <str<strong>on</strong>g>of</str<strong>on</strong>g> stochastic<br />

attack success by assigning probabilities <str<strong>on</strong>g>of</str<strong>on</strong>g> attack success against known<br />

defences. Finally, <str<strong>on</strong>g>the</str<strong>on</strong>g> paper will discuss avenues <str<strong>on</strong>g>of</str<strong>on</strong>g> future and related<br />

work, including <str<strong>on</strong>g>the</str<strong>on</strong>g> relati<strong>on</strong>ship <str<strong>on</strong>g>of</str<strong>on</strong>g> this work with <str<strong>on</strong>g>the</str<strong>on</strong>g> Metrics Framework<br />

for Cyber Command and C<strong>on</strong>trol paper, (Bernier et al. 2012) also presented<br />

at this c<strong>on</strong>ference.Keywords: cyber operati<strong>on</strong>s, c<strong>on</strong>structive simulati<strong>on</strong>,<br />

educati<strong>on</strong>, cyber effects, military operati<strong>on</strong>s<br />

A Tax<strong>on</strong>omy <str<strong>on</strong>g>of</str<strong>on</strong>g> Technical Attributi<strong>on</strong> Techniques for<br />

Cyber Attacks<br />

Andrew Nichols<strong>on</strong>, Tim Wats<strong>on</strong>, Peter Norris, Alistair Duffy and Roy Isbell<br />

De M<strong>on</strong>tfort University, Leicester, UK<br />

Abstract: In recent years <str<strong>on</strong>g>the</str<strong>on</strong>g> number <str<strong>on</strong>g>of</str<strong>on</strong>g> cyber-attacks has dramatically<br />

increased, affecting military, government, business and home users. For<br />

example, <str<strong>on</strong>g>the</str<strong>on</strong>g> UK Ministry <str<strong>on</strong>g>of</str<strong>on</strong>g> Defence claims to have blocked and investigated<br />

over 1000 serious cyber-attacks in 2010 while in 2011 Detica reported<br />

that <str<strong>on</strong>g>the</str<strong>on</strong>g> cost <str<strong>on</strong>g>of</str<strong>on</strong>g> cybercrime in <str<strong>on</strong>g>the</str<strong>on</strong>g> UK is estimated to be £27 billi<strong>on</strong> per<br />

annum. In cyber-attacks numerous methods exist that can be used to discover<br />

informati<strong>on</strong> about <str<strong>on</strong>g>the</str<strong>on</strong>g> attacking entity, o<str<strong>on</strong>g>the</str<strong>on</strong>g>rwise termed as attributi<strong>on</strong>.<br />

Attributi<strong>on</strong> is a desired quality to counter a variety <str<strong>on</strong>g>of</str<strong>on</strong>g> attackers.<br />

Cyber-crime attributi<strong>on</strong> can aid police investigati<strong>on</strong>s in identifying cyber<br />

criminals. In cyber warfare and c<strong>on</strong>flict an attributi<strong>on</strong> capability is desired<br />

to enhance decisi<strong>on</strong> making <str<strong>on</strong>g>of</str<strong>on</strong>g> Computer Network Operati<strong>on</strong>s (CNO). Attributi<strong>on</strong><br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> terrorist cyber-attacks may help to prevent future attacks.<br />

Highly publicised attacks such as Stuxnet and Night Drag<strong>on</strong> have been subject<br />

to intense analysis, yet published attributi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g>se attacks has been<br />

minimal. The complexity <str<strong>on</strong>g>of</str<strong>on</strong>g> reliable attributi<strong>on</strong> is increased by an attacker’s<br />

ability to route attacks through compromised systems, an<strong>on</strong>ymised networks,<br />

proxy servers and various jurisdicti<strong>on</strong>al boundaries. There are numerous<br />

technical attributi<strong>on</strong> techniques ranging from traceback, malware<br />

inspecti<strong>on</strong> and h<strong>on</strong>eypot deployment. In this paper we present a tax<strong>on</strong>omy<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!