Neural networks algorithm as an advisory tool in cyberattribution

  • Claudio Lopez Universidad de la Defensa Nacional
Keywords: cyber-defense, cyber-deterrance, machine learning, neutral networks

Abstract

Cyber ​​attribution is a fundamental part of a State's cyber defense. The task of assigning someone responsible for a cyber-aggression (and especially if it is another State) is really complicated, taking into account the technological advancement of tools related to the objectives of cyber-attackers. This activity (that is, Cyberattribution) is essential to create a true deterrent that discourages the execution of the aforementioned attacks. On the other hand, computer science has rapidly developed the theory and use of hundreds of artificial intelligence tools that are seen in our daily lives, and in which neural networks are used. Neural networks are fed by thousands of data and their results are more than acceptable for optimization, classification or prediction. The sources of entry of these data can be totally varied and according to their quantity it can be affirmed that it will be possible to achieve greater or lesser precision in the output. It is proposed to demonstrate that neural networks in the context of Cyberattribution procedures can be used successfully as a tool for advising on the determination of the origin of a cyber attack on an infrastructure that has a critical function. Although there are studies referring to this subject, the particularity of this thesis is that of registering in the field of cyber defense itself in a whole in accordance with current national legislation.

Downloads

Download data is not yet available.

Author Biography

Claudio Lopez, Universidad de la Defensa Nacional

Magister en ciberdefensa y Especialista en criptografía y seguridad informática. Ha desempeñado cargos directivos y gerenciales en el Área de la Defensa Nacional. En la actualidad se desempeña como director de posgrado y docente en la Universidad de la Defensa Nacional (UNDEF), Facultad de la Armada, Argentina.

References

“A Guide to Cyber Attribution”(2018), OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE US, https://www.dni.gov/files/CTIIC/documents/ODNI_A_Guide_to_Cyber_Attribution.pdf

Gazula Mohan B. , (2017), Cyber Warfare Conflict Analysis and Case Studies, Cybersecurity Interdisciplinary Systems Laboratory (CISL)- Sloan School of Management, Room E62-422 - Massachusetts Institute of Technology.

Uzal Roberto, (2016) Ciber Disuasión. Un capítulo particularmente sensitivo de la Ciberdefensa, BOLETÍN DEL ISIAE Instituto de Seguridad Internacional y Asuntos Estratégicos Número 64. 8-18

Uzal Roberto (2015), El Problema de la Ciber Atribución: Aportes para una estrategia de Ciber Defensa BOLETÍN DEL ISIAE Número 61, 2 - 9

Welch Larry D. Usaf (Ret.), s.f. “Cyberspace – the Fifth Operational Domain”. Institute for Defense Analysis https://www.ida.org/-/media/feature/publications/2/20/2011-cyberspace---the-fifth - operational-domain/2011-cyberspace---the-fifth-operational-domain.ashx

Carta de las Naciones Unidas

Decreto 2645/2014 - DIRECTIVA DE POLÍTICA DE DEFENSA NACIONAL – ACTUALIZACIÓN

Ley 23.554 de DEFENSA NACIONAL

MITRE ATT&CK MATRIX FOR ENTERPRISE (2022). https://attack.mitre.org/matrices/enterprise/

NATIONAL CYBERSECURITY AND CYBERDEFENSE POLICY SNAPSHOTS (2018)

THE GLOBAL RISKS REPORT 2021 16TH EDITION – Publicación de WORLD ECONOMIC FÓRUM

Published
2023-12-17
Section
Articles