A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies

被引:3
作者
Birthriya, Santosh Kumar [1 ]
Ahlawat, Priyanka [1 ]
Jain, Ankit Kumar [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Kurukshetra, India
关键词
Social engineering attacks; phishing attacks; impersonation; cross site scripting (XSS); malware; cyber security; NETWORKS;
D O I
10.1080/19361610.2024.2372986
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Social engineering attacks pose a significant threat to individuals, organizations, and governments globally. These attacks leverage human psychology, manipulating individuals into divulging sensitive information or undertaking actions that jeopardize security. The various forms of social engineering attacks can lead to dire consequences for the targeted victims. However, with preventive and mitigation strategies such as security awareness training, policy formulation, and technical controls, the risks associated with social engineering attacks can be diminished. This paper offers a comprehensive overview of social engineering attacks, delving into their diverse types and methodologies. It further discusses various strategies to counteract and alleviate the threats posed by these attacks. The study introduces a taxonomy of social engineering attacks, categorizing them based on the operator, prevention measures, and mitigation techniques. This thorough analysis underscores the current challenges in the domain and suggests potential future trajectories in the field.
引用
收藏
页码:244 / 292
页数:49
相关论文
共 69 条
[1]   Achieving Consistency of Software Updates against Strong Attackers [J].
Abdullah, Lamya ;
Hahn, Sebastian ;
Freiling, Felix .
THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
[2]  
Abeywardana KY, 2016, PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), P1054, DOI 10.1109/SAI.2016.7556108
[3]  
Abramov MV, 2016, PROCEEDINGS OF THE XIX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM 2016), P58, DOI 10.1109/SCM.2016.7519682
[4]   Phishing Attacks Survey: Types, Vectors, and Technical Approaches [J].
Alabdan, Rana .
FUTURE INTERNET, 2020, 12 (10) :1-39
[5]  
Albladi S, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF)
[6]  
Aldawood H., 2020, International Journal of Computer Applications, V177, P1, DOI DOI 10.5120/IJCA2020919744
[7]   An Academic Review of Current Industrial and Commercial Cyber Security Social Engineering Solutions [J].
Aldawood, Hussain ;
Skinner, Geoffrey .
PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, :110-115
[8]   Phishing environments, techniques, and countermeasures: A survey [J].
Aleroud, Ahmed ;
Zhou, Lina .
COMPUTERS & SECURITY, 2017, 68 :160-196
[9]   Measuring Source Credibility of Social Engineering Attackers on Facebook [J].
Algarni, Abdullah ;
Xu, Yue ;
Chan, Taizan .
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, :3686-3695
[10]  
ALRUBAIAN M, 2015, P 2 WORLD S WEB APPL, P1