Accession Number : ADA468859

Title :   Techniques for Cyber Attack Attribution

Descriptive Note : Study rept.

Corporate Author : INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA

Personal Author(s) : Wheeler, David A. ; Larsen, Gregory N.

PDF Url : ADA468859

Report Date : OCT 2003

Pagination or Media Count : 82

Abstract : This paper summarizes various techniques to perform attribution of computer attackers who are exploiting data networks. Attribution can be defined as determining the identity or location of an attacker or an attacker's intermediary. In the public literature "traceback" or "source tracking" are often used as terms instead of "attribution." This paper is intended for use by the U.S. Department of Defense (DoD) as it considers if it should improve its attribution capability, and if so, how to do so. However, since the focus of this paper is on technology, it may also be of use to many others such as law enforcement personnel. This is a technical report, and assumes that the reader understands the basics of network technology, especially the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols.

Descriptors :   *COMPUTER NETWORKS, *CYBERTERRORISM, DEPARTMENT OF DEFENSE, DATA PROCESSING SECURITY, INTRUSION DETECTION(COMPUTERS), INFORMATION ASSURANCE, INTERNET, DATA TRANSMISSION SYSTEMS, ATTACK

Subject Categories : Computer Systems Management and Standards

Distribution Statement : APPROVED FOR PUBLIC RELEASE