Abstract
Cyber attribution is a difficult problem, and conducting attribution research is made even more difficult by a lack of data with ground truth. In this chapter, we describe a game-based framework (Capture-the-Flag) to produce cyber attribution data with deception. We discuss the motivation and the design of the contest and the framework to record data. The framework is available as open source software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
C. Cowan, S. Arnold, S. Beattie, C. Wright, and J. Viega. Defcon capture the flag: Defending vulnerable code from intense attack. In DARPA Information Survivability Conference and Exposition, 2003. Proceedings, volume 1, pages 120–129. IEEE, 2003.
DARPA. Cyber grand challenge, 2016. http://archive.darpa.mil/cybergrandchallenge/.
A. Ruef, E. Nunes, P. Shakarian, and G. I. Simari. Cyber attribution game framework. 2017. Available at https://github.com/trailofbits/attribution-vm.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Nunes, E., Shakarian, P., Simari, G.I., Ruef, A. (2018). Enhanced Data Collection for Cyber Attribution. In: Artificial Intelligence Tools for Cyber Attribution. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-73788-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-73788-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73787-4
Online ISBN: 978-3-319-73788-1
eBook Packages: Computer ScienceComputer Science (R0)