@inproceedings{205c354522b64b5c88748c24b3f97110,
title = "Cyber-deception and attribution in capture-the-flag exercises",
abstract = "Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is known. In this work, we use various classification techniques to identify the culprit in a cyberattack and find that deceptive activities account for the majority of misclassified samples. We also explore several heuristics to alleviate some of the misclassification caused by deception.",
author = "Eric Nunes and Nimish Kulkarni and Paulo Shakarian and Andrew Ruef and Jay Little",
note = "Copyright: Copyright 2016 Elsevier B.V., All rights reserved.; IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015 ; Conference date: 25-08-2015 Through 28-08-2015",
year = "2015",
month = aug,
day = "25",
doi = "10.1145/2808797.2809362",
language = "English (US)",
series = "Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015",
publisher = "Association for Computing Machinery, Inc",
pages = "962--965",
editor = "Jian Pei and Jie Tang and Fabrizio Silvestri",
booktitle = "Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015",
}