Advertisement

Attribution Of Cyber Attacks On Process Control Systems

  • Jeffrey Hunker
  • Robert Hutchinson
  • Jonathan Margulies
Conference paper
Part of the The International Federation for Information Processing book series (IFIPAICT, volume 290)

The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community.

Keywords

Process control systems cyber attacks attack attribution 

References

  1. 1.
    W. Clinton, Presidential Decision Directive 63, The White House, Washington, DC (fas.org/irp/offdocs/pdd/pdd-63.htm), May 22, 1998.Google Scholar
  2. 2.
    J. Hunker, R. Hutchinson and J. Margulies, Roles and Challenges for Sufficient Cyber Attack Attribution, Research Report, Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, 2008.Google Scholar
  3. 3.
    H. Lipson, Tracking and Tracing Cyber Attacks: Technical Challenges and Global Policy Issues, Special Report CMU/SEI-2002-SR-009, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2002.Google Scholar
  4. 4.
    P. Pederson, D. Dudenhoeffer, S. Hartley and M. Permann, Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research, Report No. INL/EXT-06-11464, Critical Infrastructure Protection Division, Idaho National Laboratory, Idaho Falls, Idaho, 2006.Google Scholar
  5. 5.
    T. Samad, P. McLaughlin and J. Lu, System architecture for process automation: Review and trends, Journal of Process Control, vol. 17(3), pp.191–201, 2007.CrossRefGoogle Scholar
  6. 6.
    D. Wheeler and G. Larson, Techniques for Cyber Attack Attribution, IDA Paper P-3792, Institute for Defense Analyses, Alexandria, Virginia, 2003.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Jeffrey Hunker
    • 2
  • Robert Hutchinson
    • 1
  • Jonathan Margulies
    • 1
  1. 1.Sandia National LaboratoriesAlbuquerqueUSA
  2. 2.Heinz School of Public Policy and Management at Carnegie Mellon UniversityPittsburghUSA

Personalised recommendations