Abstract

A major challenge in cyberthreat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. In this chapter, we leverage the dataset from the capture-the-flag event held at DEFCON discussed in Chap. 2, and propose DeLP3E model comprised solely of the AM (that is, without probabilistic information) designed to aid an analyst in attributing a cyberattack. We build models from latent variables to reduce the search space of culprits (attackers), and show that this reduction significantly improves the accuracy of the classification-based approaches discussed in Chap. 2 from 37% to 62% in identifying the attacker.

Original languageEnglish (US)
Title of host publicationSpringerBriefs in Computer Science
PublisherSpringer
Pages75-84
Number of pages10
Edition9783319737874
DOIs
StatePublished - Jan 1 2018

Publication series

NameSpringerBriefs in Computer Science
Number9783319737874
ISSN (Print)2191-5768
ISSN (Electronic)2191-5776

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Nunes, E., Shakarian, P., Simari, G. I., & Ruef, A. (2018). Applying argumentation models for cyber attribution. In SpringerBriefs in Computer Science (9783319737874 ed., pp. 75-84). (SpringerBriefs in Computer Science; No. 9783319737874). Springer. https://doi.org/10.1007/978-3-319-73788-1_5

Applying argumentation models for cyber attribution. / Nunes, Eric; Shakarian, Paulo; Simari, Gerardo I.; Ruef, Andrew.

SpringerBriefs in Computer Science. 9783319737874. ed. Springer, 2018. p. 75-84 (SpringerBriefs in Computer Science; No. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Nunes, E, Shakarian, P, Simari, GI & Ruef, A 2018, Applying argumentation models for cyber attribution. in SpringerBriefs in Computer Science. 9783319737874 edn, SpringerBriefs in Computer Science, no. 9783319737874, Springer, pp. 75-84. https://doi.org/10.1007/978-3-319-73788-1_5
Nunes E, Shakarian P, Simari GI, Ruef A. Applying argumentation models for cyber attribution. In SpringerBriefs in Computer Science. 9783319737874 ed. Springer. 2018. p. 75-84. (SpringerBriefs in Computer Science; 9783319737874). https://doi.org/10.1007/978-3-319-73788-1_5
Nunes, Eric ; Shakarian, Paulo ; Simari, Gerardo I. ; Ruef, Andrew. / Applying argumentation models for cyber attribution. SpringerBriefs in Computer Science. 9783319737874. ed. Springer, 2018. pp. 75-84 (SpringerBriefs in Computer Science; 9783319737874).
@inbook{4cec75f62c594ff9a23c8c4edb1f573e,
title = "Applying argumentation models for cyber attribution",
abstract = "A major challenge in cyberthreat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. In this chapter, we leverage the dataset from the capture-the-flag event held at DEFCON discussed in Chap. 2, and propose DeLP3E model comprised solely of the AM (that is, without probabilistic information) designed to aid an analyst in attributing a cyberattack. We build models from latent variables to reduce the search space of culprits (attackers), and show that this reduction significantly improves the accuracy of the classification-based approaches discussed in Chap. 2 from 37{\%} to 62{\%} in identifying the attacker.",
author = "Eric Nunes and Paulo Shakarian and Simari, {Gerardo I.} and Andrew Ruef",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-3-319-73788-1_5",
language = "English (US)",
series = "SpringerBriefs in Computer Science",
publisher = "Springer",
number = "9783319737874",
pages = "75--84",
booktitle = "SpringerBriefs in Computer Science",
edition = "9783319737874",

}

TY - CHAP

T1 - Applying argumentation models for cyber attribution

AU - Nunes, Eric

AU - Shakarian, Paulo

AU - Simari, Gerardo I.

AU - Ruef, Andrew

PY - 2018/1/1

Y1 - 2018/1/1

N2 - A major challenge in cyberthreat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. In this chapter, we leverage the dataset from the capture-the-flag event held at DEFCON discussed in Chap. 2, and propose DeLP3E model comprised solely of the AM (that is, without probabilistic information) designed to aid an analyst in attributing a cyberattack. We build models from latent variables to reduce the search space of culprits (attackers), and show that this reduction significantly improves the accuracy of the classification-based approaches discussed in Chap. 2 from 37% to 62% in identifying the attacker.

AB - A major challenge in cyberthreat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. In this chapter, we leverage the dataset from the capture-the-flag event held at DEFCON discussed in Chap. 2, and propose DeLP3E model comprised solely of the AM (that is, without probabilistic information) designed to aid an analyst in attributing a cyberattack. We build models from latent variables to reduce the search space of culprits (attackers), and show that this reduction significantly improves the accuracy of the classification-based approaches discussed in Chap. 2 from 37% to 62% in identifying the attacker.

UR - http://www.scopus.com/inward/record.url?scp=85044976153&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85044976153&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-73788-1_5

DO - 10.1007/978-3-319-73788-1_5

M3 - Chapter

AN - SCOPUS:85044976153

T3 - SpringerBriefs in Computer Science

SP - 75

EP - 84

BT - SpringerBriefs in Computer Science

PB - Springer

ER -