发现网络攻击的过程如何使我们对网络安全的理解产生偏差

IF 3.4 1区 社会学 Q1 INTERNATIONAL RELATIONS Journal of Peace Research Pub Date : 2024-02-16 DOI:10.1177/00223433231217687
Harry Oppenheimer
{"title":"发现网络攻击的过程如何使我们对网络安全的理解产生偏差","authors":"Harry Oppenheimer","doi":"10.1177/00223433231217687","DOIUrl":null,"url":null,"abstract":"Social scientists do not directly study cyberattacks; they draw inferences from attack reports that are public and visible. Like human rights violations or war casualties, there are missing cyberattacks that researchers have not observed. The existing approach is to either ignore missing data and assume they do not exist or argue that reported attacks accurately represent the missing events. This article is the first to detail the steps between attack, discovery and public report to identify sources of bias in cyber data. Visibility bias presents significant inferential challenges for cybersecurity – some attacks are easy to observe or claimed by attackers, while others take a long time to surface or are carried out by actors seeking to hide their actions. The article argues that missing attacks in public reporting likely share features of reported attacks that take the longest to surface. It builds on datasets of cyberattacks by or against Five Eyes (an intelligence alliance composed of Australia, Canada, New Zealand, the United Kingdom and the United States) governments and adds new data on when attacks occurred, when the media first reported them, and the characteristics of attackers and techniques. Leveraging survival models, it demonstrates how the delay between attack and disclosure depends on both the attacker’s identity (state or non-state) and the technical characteristics of the attack (whether it targets information confidentiality, integrity, or availability). The article argues that missing cybersecurity events are least likely to be carried out by non-state actors or target information availability. Our understanding of ‘persistent engagement,’ relative capabilities, ‘intelligence contests’ and cyber coercion rely on accurately measuring restraint. This article’s findings cast significant doubt on whether researchers have accurately measured and observed restraint, and informs how others should consider external validity. This article has implications for our understanding of data bias, empirical cybersecurity research and secrecy in international relations.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"56 1","pages":""},"PeriodicalIF":3.4000,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How the process of discovering cyberattacks biases our understanding of cybersecurity\",\"authors\":\"Harry Oppenheimer\",\"doi\":\"10.1177/00223433231217687\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social scientists do not directly study cyberattacks; they draw inferences from attack reports that are public and visible. Like human rights violations or war casualties, there are missing cyberattacks that researchers have not observed. The existing approach is to either ignore missing data and assume they do not exist or argue that reported attacks accurately represent the missing events. This article is the first to detail the steps between attack, discovery and public report to identify sources of bias in cyber data. Visibility bias presents significant inferential challenges for cybersecurity – some attacks are easy to observe or claimed by attackers, while others take a long time to surface or are carried out by actors seeking to hide their actions. The article argues that missing attacks in public reporting likely share features of reported attacks that take the longest to surface. It builds on datasets of cyberattacks by or against Five Eyes (an intelligence alliance composed of Australia, Canada, New Zealand, the United Kingdom and the United States) governments and adds new data on when attacks occurred, when the media first reported them, and the characteristics of attackers and techniques. Leveraging survival models, it demonstrates how the delay between attack and disclosure depends on both the attacker’s identity (state or non-state) and the technical characteristics of the attack (whether it targets information confidentiality, integrity, or availability). The article argues that missing cybersecurity events are least likely to be carried out by non-state actors or target information availability. Our understanding of ‘persistent engagement,’ relative capabilities, ‘intelligence contests’ and cyber coercion rely on accurately measuring restraint. This article’s findings cast significant doubt on whether researchers have accurately measured and observed restraint, and informs how others should consider external validity. This article has implications for our understanding of data bias, empirical cybersecurity research and secrecy in international relations.\",\"PeriodicalId\":48324,\"journal\":{\"name\":\"Journal of Peace Research\",\"volume\":\"56 1\",\"pages\":\"\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2024-02-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Peace Research\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1177/00223433231217687\",\"RegionNum\":1,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Peace Research","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1177/00223433231217687","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 0

摘要

社会科学家并不直接研究网络攻击,而是从公开可见的攻击报告中得出推论。就像侵犯人权行为或战争伤亡一样,研究人员没有观察到的网络攻击也会缺失。现有的方法是要么忽略缺失的数据并假定它们不存在,要么认为报告的攻击事件准确地代表了缺失的事件。本文首次详细介绍了攻击、发现和公开报告之间的步骤,以确定网络数据的偏差来源。可见性偏差给网络安全带来了巨大的推论挑战--有些攻击很容易被观察到或被攻击者声称,而另一些攻击则需要很长时间才能浮出水面或由试图隐藏其行动的行为者实施。文章认为,公开报告中遗漏的攻击很可能与报告中浮出水面时间最长的攻击具有相同的特征。文章以 "五眼"(由澳大利亚、加拿大、新西兰、英国和美国组成的情报联盟)政府发动或针对其发动的网络攻击数据集为基础,增加了有关攻击发生时间、媒体首次报道时间以及攻击者和攻击技术特征的新数据。文章利用生存模型,展示了攻击与披露之间的延迟如何取决于攻击者的身份(国家或非国家)和攻击的技术特征(是否针对信息的保密性、完整性或可用性)。文章认为,缺失的网络安全事件最不可能由非国家行为者实施,也最不可能以信息可用性为目标。我们对 "持续参与"、相对能力、"情报竞赛 "和网络胁迫的理解有赖于对克制的准确测量。本文的研究结果让人对研究人员是否准确测量和观察了克制产生了极大的怀疑,并告诉其他人应如何考虑外部有效性。这篇文章对我们理解数据偏差、网络安全实证研究和国际关系中的保密问题都有影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
How the process of discovering cyberattacks biases our understanding of cybersecurity
Social scientists do not directly study cyberattacks; they draw inferences from attack reports that are public and visible. Like human rights violations or war casualties, there are missing cyberattacks that researchers have not observed. The existing approach is to either ignore missing data and assume they do not exist or argue that reported attacks accurately represent the missing events. This article is the first to detail the steps between attack, discovery and public report to identify sources of bias in cyber data. Visibility bias presents significant inferential challenges for cybersecurity – some attacks are easy to observe or claimed by attackers, while others take a long time to surface or are carried out by actors seeking to hide their actions. The article argues that missing attacks in public reporting likely share features of reported attacks that take the longest to surface. It builds on datasets of cyberattacks by or against Five Eyes (an intelligence alliance composed of Australia, Canada, New Zealand, the United Kingdom and the United States) governments and adds new data on when attacks occurred, when the media first reported them, and the characteristics of attackers and techniques. Leveraging survival models, it demonstrates how the delay between attack and disclosure depends on both the attacker’s identity (state or non-state) and the technical characteristics of the attack (whether it targets information confidentiality, integrity, or availability). The article argues that missing cybersecurity events are least likely to be carried out by non-state actors or target information availability. Our understanding of ‘persistent engagement,’ relative capabilities, ‘intelligence contests’ and cyber coercion rely on accurately measuring restraint. This article’s findings cast significant doubt on whether researchers have accurately measured and observed restraint, and informs how others should consider external validity. This article has implications for our understanding of data bias, empirical cybersecurity research and secrecy in international relations.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
6.70
自引率
5.60%
发文量
80
期刊介绍: Journal of Peace Research is an interdisciplinary and international peer reviewed bimonthly journal of scholarly work in peace research. Edited at the International Peace Research Institute, Oslo (PRIO), by an international editorial committee, Journal of Peace Research strives for a global focus on conflict and peacemaking. From its establishment in 1964, authors from over 50 countries have published in JPR. The Journal encourages a wide conception of peace, but focuses on the causes of violence and conflict resolution. Without sacrificing the requirements for theoretical rigour and methodological sophistication, articles directed towards ways and means of peace are favoured.
期刊最新文献
Friends and partners: Estimating latent affinity networks with the graphical LASSO Demographic features or spatial structures? Unpacking local variation during the 2022 Iranian protests Many hurdles to take: Explaining peacekeepers’ ability to engage in human rights activities De jure powersharing 1975–2019: Updating the Inclusion, Dispersion, and Constraints Dataset How user language affects conflict fatality estimates in ChatGPT
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1