We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

The Problem of Attribution in Cyber Security

by Rajesh Kumar Goutam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 7
Year of Publication: 2015
Authors: Rajesh Kumar Goutam
10.5120/ijca2015907386

Rajesh Kumar Goutam . The Problem of Attribution in Cyber Security. International Journal of Computer Applications. 131, 7 ( December 2015), 34-36. DOI=10.5120/ijca2015907386

@article{ 10.5120/ijca2015907386,
author = { Rajesh Kumar Goutam },
title = { The Problem of Attribution in Cyber Security },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 7 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number7/23463-2015907386/ },
doi = { 10.5120/ijca2015907386 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:26:38.398754+05:30
%A Rajesh Kumar Goutam
%T The Problem of Attribution in Cyber Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 7
%P 34-36
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The basic objective for the construction of internet was to provide a common platform to researchers and students to share information among them. It was not constructed to track and trace the behavior of cyber criminals. Due to this reason, it is difficult to locate the origin of cybercrime. The paper defines cybercrime with treat and vulnerability and suggests a number of different techniques which are often used by the cybercriminals to Spoofing the IP. The purpose of this paper is not only to detail about why the attribution of cybercrime is difficult but also to present TTL and step stone logic which are now being heavily used in cybercrime.

References
  1. A Report available at http://www.pen-tests.com/difference-between-threat-vulnerability-and-risk.html.
  2. A Report “Cybercrimes”, National crime presentation council, USA, September 2012.
  3. Nilkund Aseef, Pamela Davis, Manish Mittal, Khaled Sedky and Ahmed Tolba, “Cyber-Criminal Activity and Analysis”, A White paper report, 2005 available at http://courses.cs.washington.edu/courses/csep590/05au/whitepaper_turnin/team2-whitepaper.pdf
  4. Jeffrey Hunker, Robert Hutchinson and Jonathan Margulies, “Attribution of Cyber attacks on process control systems”, IFIP International Federation for Information Processing, Volume 290; Critical Infrastructure Protection II, pp. 87–99, 2008.
  5. AReportavailableathttp://www.infocean.com/solutions/threatvulnerability-management/. On 05/11/2015.
  6. Bellovin, Steve, “Security Problems in TCP/IP Protocol suite”, ACM Computer Communications Review, 1989, pp. 32-48.
  7. Susan C. Lee and Clay Shields, “Technical, Legal and Societal Challenges to Automated Attack Traceback”, A Report from IT Pro, June 2002.
  8. David A. Wheeler, Gregory N. Larsen and Task Leader, “Techniques for Cyber Attack Attribution”, Institute for Defense Analysis, October 2003.
  9. H.F Lipson. Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Carnegie Mellon Software Engineering Institute, Pittsburgh, November 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Cybercrime Attribution IP forging.