49,440
Views
244
CrossRef citations to date
0
Altmetric
Original Articles

Attributing Cyber Attacks

&

Bibliography

  • Anderson, Nate and Cyrus Farivar, ‘How the feds took down the Dread Pirate Roberts’, Ars Technica, 3 Oct. 2013.
  • APT1, Alexandria, VA: Mandiant, 18 Feb. 2013.
  • Arquilla, John and David Ronfeldt, The Advent of Netwar (Santa Monica, CA: RAND 1996).
  • Axelrod, Robert and Rumen Iliev, ‘Timing of cyber conflict’ PNAS. 111/4 (28 Jan. 2014), 1298–303.
  • Barzashka, Ivanka, ‘Are Cyber-Weapons Effective?,’ RUSI Journal 158/2 (April/May 2013), 48–56.
  • Betts, Richard K, ‘Analysis, War, and Decision: Why Intelligence Failures Are Inevitable’, World Politics. 31/1 (Oct. 1978), 61–89
  • Betz, David and Tim Stevens, Cyberspace and the State, Adelphi Series (London: IISS/Routledge 2011)
  • Boebert, W. Earl, ‘A Survey of Challenges in Attribution’, in Committee on Deterring Cyberattacks (ed.), Proceedings of a Workshop on Deterring Cyberattacks. (Washington DC: National Academies Press 2011), 41–54.
  • Brenner, Susan, ‘‘‘At Light Speed”: Attribution and Response to Cybercrime/Terrorism/Warfare’, Journal of Criminal Law & Criminology, 97/2 (2007), 379–475.
  • Bronk, Christopher and Eneken Tikk, ‘The Cyber Attack on Saudi Aramco’, Survival 55/2 ( April–May 2013), 81–96.
  • Caltagirone, Sergio, Andrew Pendergast and Christopher Betz, The Diamond Model of Intrusion Analysis, ADA586960 (Hanover, MD: Center for Cyber Threat Intelligence and Threat Research 5 July 2013)
  • Churchill, Winston S., The Gathering Storm: The Second World War, Volume 1, (New York: Rosetta Books 2002).
  • Clark, David D. and Susan Landau, ‘Untangling Attribution’, in Committee on Deterring Cyberattacks (ed.), in Proceedings of a Workshop on Deterring Cyberattacks, (Washington DC: National Academies Press 2011), 25–40.
  • Clausewitz, Carl von, On War, translated by Michael Howard and Peter Paret (Princeton UP 1976).
  • Clayton, Richard, Anonymity and Traceability in Cyberspace, Vol. 653, Technical Report (Cambridge: Univ. of Cambridge Computer Laboratory 2005).
  • Deibert, Ronald J., Rafal Rohozinski and Masashi Crete-Nishihata, ‘Cyclones in Cyberspace’, Security Dialogue 43/1 (2012), 3–24.
  • Department of Defense, Cyberspace Policy Report, Nov. 2011.
  • Gauss, Kaspersky Lab, 9 Aug. 2012.
  • Global Threat Report, Arlington, VA: CrowdStrike, 22 Jan. 2014.
  • Goldsmith, Jack and Tim Wu, Who Controls the Internet? Illusions of a Borderless World (Oxford: OUP 2006).
  • Gostev, Alexander, The Flame: Questions and Answers, Kaspersky Lab, 28 May 2012.
  • Hartley, Nathaniel, Hat-tribution to PLA Unit 61486 ( CrowdStrike, 9 June 2014).
  • Healey, Jason, A Fierce Domain (Washington DC: The Atlantic Council 2013).
  • Hutchins, Eric M., Michael J. Cloppert and Rohan M. Amin, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains (Bethesda, MD: Lockheed Martin Corporation 2010).
  • Kent, Sherman, ‘Estimates and Influence’, Studies in Intelligence 12, ( Summer 1968), 11–21.
  • Knake, Robert K., ‘Untangling Attribution: Moving to Accountability in Cyberspace, Planning for the Future of Cyber Attack’, Washington DC: Subcommittee on Technology and Innovation, 111th Congress, 15 July 2010.
  • Langner, Ralph, ‘Stuxnet’s Secret Twin’, Foreign Policy, 19 Nov. 2013.
  • Libicki, Martin, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Corporation, 2009).
  • Lindsay, Jon R., ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3, (2013), 365–404.
  • Lupovici, Amir, ‘The “Attribution Problem” and the Social Construction of ‘Violence’’’International Studies Perspectives 2014, 1–21.
  • McConnell, Michael, ‘Cyberwar is the New Atomic Age’ New Perspectives Quarterly 26/3 (Summer 2009), 72–7.
  • McDonald, Geoff, Liam O Murchu, Stephen Doherty and Eric Chien, Stuxnet 0.5: The Missing Link, Version 1.0, Symantec, 26 Feb. 2013.
  • Moran, Ned and James Bennett, Supply Chain Analysis: From Quartermaster to Sun-shop, FireEye Labs, 11 Nov. 2013.
  • Moran, Ned, Joshua Homan and Mike Scott, Operation Poisoned Hurricane, FireEye, 6 Aug. 2014.
  • Nye, Joseph S., Cyber Power (Fort Belvoir, VA: Defense Technical Information Center 2010).
  • O’Gorman, Gavin and Geoff McDonald, The Elderwood Project, Symantec, 6 Sept. 2012.
  • Panetta, Leon, ‘Remarks on Cybersecurity to the Business Executives for National Security’, New York City, Washington DC: Department of Defense, 12 October 2012.
  • Putter Panda, CrowdStrike, 9 June 2014.
  • Raiu, Costin, Igor Soumenkov, Kurt Baumgartner and Vitaly Kamluk, The MiniDuke Mystery, Kaspersky Lab, 25 Feb. 2013.
  • ‘Red October’ Diplomatic Cyber Attacks Investigation, Version 1.0, Kaspersky Lab, 14 January 2013
  • Rid, Thomas, Cyber War will Not Take Place (Oxford/New York: OUP 2013).
  • Rivner, Uri, Anatomy of an Attack, RSA, 1 April 2011.
  • Roscini, Marco, Cyber Operations and the Use of Force in International Law (Oxford: OUP 2014).
  • Rosenbaum, Ron, ‘Cassandra Syndrome’, Smithsonian Magazine 43/1, (April 2012), 12.
  • Schoen, Seth and Eva Galperin, ‘Iranian Man-in-the-Middle Attack Against Google Demonstrates Dangerous Weakness of Certificate Authorities’, Electronic Frontier Foundation, 29 Aug. 2011.
  • Singer, P.W. and Allan Friedman, Cybersecurity and Cyberwar (New York/ Oxford: OUP 2014).
  • Slay, Jill and Michael Miller, ‘Lessons Learned from the Maroochy Water Breach’, in E. Goetz and S. Shenoi (ed.), Critical Infrastructure Protection, Vol. 253, (Boston, MA: Springer 2008), 73–82.
  • Stoll, Clifford, The Cuckoo’s Egg (New York: Doubleday 1989).
  • The Epic Turla Operation, Kaspersky Lab, 7 Aug. 2014.
  • The ‘Icefog’ APT, Kaspersky Lab, 25 Sept. 2013.
  • The Nettraveler, Kaspersky Lab, 4 June 2013.
  • Threat Report: Beyond the Breach, Reston, VA: Mandiant, 18 Feb. 2014.
  • Tsagourias, Nicholas, ‘Cyber Attacks, Self-Defence and the Problem of Attribution’ Journal of Conflict & Security Law 17/2 (2013), 229–44.
  • United States of America v Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, Gu Chunhui, Criminal Nr 14-118, Erie, PA: US District Court Western District of Pennsylvania, 1 May 2014.
  • Unveiling ‘Careto’, Version 1.0, Kaspersky Lab, 6 Feb. 2014.
  • Verton, Dan, Confessions of Teenage Hackers (New York: McGraw Hill 2000).
  • Waxman, Matthew C., ‘Cyber-Attacks and the Use of Force’, The Yale Journal of International Law 36 (2011), 421–59.
  • Weaver, Nicholas, ‘A Close Look at the NSA’s Most Powerful Internet Attack Tool’, Wired, 13 March 2014.
  • Wheeler, David A. and Gregory N. Larsen, Techniques for Cyber Attack Attribution (Alexandria, VA: Institute for Defense Analysis 2003).
  • W32.Duqu, Version 1.4, Symantec, 23 Nov. 2011.
  • Zetter, Kim, ‘How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History’, Wired Magazine, 11 July 2011.
  • Zetter, Kim, Countdown to Zero Day (New York: Crown 2014).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.