Neural networks algorithm as an advisory tool in cyberattribution
Abstract
Cyber attribution is a fundamental part of a State's cyber defense. The task of assigning someone responsible for a cyber-aggression (and especially if it is another State) is really complicated, taking into account the technological advancement of tools related to the objectives of cyber-attackers. This activity (that is, Cyberattribution) is essential to create a true deterrent that discourages the execution of the aforementioned attacks. On the other hand, computer science has rapidly developed the theory and use of hundreds of artificial intelligence tools that are seen in our daily lives, and in which neural networks are used. Neural networks are fed by thousands of data and their results are more than acceptable for optimization, classification or prediction. The sources of entry of these data can be totally varied and according to their quantity it can be affirmed that it will be possible to achieve greater or lesser precision in the output. It is proposed to demonstrate that neural networks in the context of Cyberattribution procedures can be used successfully as a tool for advising on the determination of the origin of a cyber attack on an infrastructure that has a critical function. Although there are studies referring to this subject, the particularity of this thesis is that of registering in the field of cyber defense itself in a whole in accordance with current national legislation.
Downloads
References
“A Guide to Cyber Attribution”(2018), OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE US, https://www.dni.gov/files/CTIIC/documents/ODNI_A_Guide_to_Cyber_Attribution.pdf
Gazula Mohan B. , (2017), Cyber Warfare Conflict Analysis and Case Studies, Cybersecurity Interdisciplinary Systems Laboratory (CISL)- Sloan School of Management, Room E62-422 - Massachusetts Institute of Technology.
Uzal Roberto, (2016) Ciber Disuasión. Un capítulo particularmente sensitivo de la Ciberdefensa, BOLETÍN DEL ISIAE Instituto de Seguridad Internacional y Asuntos Estratégicos Número 64. 8-18
Uzal Roberto (2015), El Problema de la Ciber Atribución: Aportes para una estrategia de Ciber Defensa BOLETÍN DEL ISIAE Número 61, 2 - 9
Welch Larry D. Usaf (Ret.), s.f. “Cyberspace – the Fifth Operational Domain”. Institute for Defense Analysis https://www.ida.org/-/media/feature/publications/2/20/2011-cyberspace---the-fifth - operational-domain/2011-cyberspace---the-fifth-operational-domain.ashx
Carta de las Naciones Unidas
Decreto 2645/2014 - DIRECTIVA DE POLÍTICA DE DEFENSA NACIONAL – ACTUALIZACIÓN
Ley 23.554 de DEFENSA NACIONAL
MITRE ATT&CK MATRIX FOR ENTERPRISE (2022). https://attack.mitre.org/matrices/enterprise/
NATIONAL CYBERSECURITY AND CYBERDEFENSE POLICY SNAPSHOTS (2018)
THE GLOBAL RISKS REPORT 2021 16TH EDITION – Publicación de WORLD ECONOMIC FÓRUM
The articles published in the journal Ciencia y Tecnología are the exclusive property of their authors. Their opinions and content belong to their authors, and the Universidad de Palermo declines all responsibility for the rights that may arise from reading and/or interpreting the content of the published articles.
The reproduction, use or exploitation by any third party of the published articles is not authorized. Its use is only authorized for exclusively academic and/or research purposes.