We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Cyber-Deception and Attribution in Capture-the-Flag Exercises

Abstract: Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is known. In this work, we use various classification techniques to identify the culprit in a cyberattack and find that deceptive activities account for the majority of misclassified samples. We also explore several heuristics to alleviate some of the misclassification caused by deception.
Comments: 4 pages Short name accepted to FOSINT-SI 2015
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:1507.01922 [cs.CR]
  (or arXiv:1507.01922v1 [cs.CR] for this version)

Submission history

From: Eric Nunes [view email]
[v1] Tue, 7 Jul 2015 19:04:08 GMT (409kb,D)

Link back to: arXiv, form interface, contact.