← Back to Concept Index

cyber-attack-attribution

The difficulty in accurately identifying the true origin of cyber attacks due to the use of intermediary networks and compromised systems.

2 chapters across 1 book

Cyber War: The Next Threat to National Security and What to Do About It (2012)Richard A. Clarke and Robert K. Knake

4. GLOBAL WAR

The chapter explores a hypothetical cyber conflict scenario involving the U.S., China, Estonia, and Russia, illustrating how cyber attacks can quickly escalate into global confrontations due to the interconnected nature of networks and the difficulty of tracing attack origins. It highlights the complexities of attribution in cyber warfare, the potential for collateral damage across national borders, and the challenges posed by the rapid, borderless spread of cyber weapons like worms.

8. ATTRIBUTION

The chapter discusses the complexities and challenges of attribution in cyber warfare, emphasizing how difficult it is to definitively identify attackers due to tactics like plausible deniability and multi-country server routing. It contrasts the perspectives of corporate cybersecurity professionals, who prioritize recovery over attribution, with national security officials who require accurate identification for diplomatic or retaliatory responses. The chapter also highlights the limitations of technical trace-back methods and the potential need for traditional intelligence and human espionage to confirm attackers' identities.