
Attribution in cyberspace: techniques and legal implications
Author(s) -
Shamsi Jawwad A.,
Zeadally Sherali,
Sheikh Fareha,
Flowers Angelyn
Publication year - 2016
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1485
Subject(s) - attribution , cyberspace , computer science , authorship attribution , identification (biology) , computer security , limiting , internet privacy , artificial intelligence , social psychology , the internet , world wide web , psychology , mechanical engineering , botany , engineering , biology
Attribution of cybercrimes is significant in limiting the rate of crime as well as in preparing the required level of response. Motivated by this significance, we introduce a level‐based approach for achieving attribution. In our proposed approach, attribution consists of three steps: (1) identification of the cyberweapon used; (2) determination of the origin of the attack; and (3) identification of the actual attacker. We conduct an in‐depth analysis of recently proposed attribution techniques. Our analysis reveals that indirect methods of attribution are particularly effective when attributing cybercrimes; many of them remain unattributed. We also discuss some of the legal issues pertaining to attribution, and we argue that well‐defined international laws for cyberspace along with strong cooperation among governments are needed to track down and punish cybercriminals. Copyright © 2016 John Wiley & Sons, Ltd.