The IT Law Wiki
Advertisement

Definitions[]

Cybersecurity[]

Attribution

is the process of determining the identity of the source of a cyber attack. Types of attribution can include both digital identity (computer, user account, IP address, or enabling software) and physical identity (John Doe was the hacker using the computer from which an attack originated). Attribution can also support a new model of authorization using accountability as a basis for deciding which operations or resources to trust.[1]
identifies an adversary linked to a particular incident. It is the culmination of the review of evidence and intelligence gathered during an incident which results in an assessment that identifies individuals or organizations which likely played a role in the cyber incident.[2]

Moral rights[]

See right of attribution.

Overview (Cybersecurity)[]

"Attribution is a fundamental part of an effective cyber deterrence strategy as anonymity enables malicious cyber activity by state and non-state groups. On matters of intelligence, attribution, and warning, DoD and the intelligence community have invested significantly in all source collection, analysis, and dissemination capabilities, all of which reduce the anonymity of state and non-state actor activity in cyberspace. Intelligence and attribution capabilities help to unmask an actor's cyber persona, identify the attack's point of origin, and determine tactics, techniques, and procedures. Attribution enables the Defense Department or other agencies to conduct response and denial operations against an incoming cyberattack."[3]

"Dynamic IP address assignment and spoofing make attribution a significant technical challenge. Generally, only with cooperation from the attacker's ISP might the attacker be identified. Many times, however, the evidence to attribute the attack to an individual remains inconclusive. Open wireless access points, Internet cafes, and similar venues that allow Internet access without positive identification and authentication further exacerbate this problem."[4]

References[]

  1. Computation Institute, "Forensics, Traceback, and Attribution" (July 16, 2007) (full-text).
  2. National Cyber Incident Response Plan, at 23.
  3. The DoD Cyber Strategy, at 11-12.
  4. Computation Institute, "Forensics, Traceback, and Attribution" (July 16, 2007) (full-text).
Advertisement