@inbook{8400451e5e89410db453d191cb24a25d,
title = "Baseline cyber attribution models",
abstract = "Attributing the culprit of a cyberattack is widely considered one of the major technical and policy challenges of cybersecurity. While the lack of ground truth for an individual responsible for a given attack has limited previous studies, here we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground truth is known. In this chapter, we use various classification techniques to identify the culprit in a cyberattack and find that deceptive activities account for the majority of misclassified attacks. We also explore several heuristics to alleviate some of the misclassification caused by deception.",
author = "Eric Nunes and Paulo Shakarian and Simari, {Gerardo I.} and Andrew Ruef",
note = "Publisher Copyright: {\textcopyright} The Author(s) 2018. Copyright: Copyright 2021 Elsevier B.V., All rights reserved.",
year = "2018",
doi = "10.1007/978-3-319-73788-1_2",
language = "English (US)",
series = "SpringerBriefs in Computer Science",
publisher = "Springer",
number = "9783319737874",
pages = "5--16",
booktitle = "SpringerBriefs in Computer Science",
edition = "9783319737874",
}