An Effective Double-Layer Detection System Against Social Engineering Attacks

被引:4
|
作者
He, Daojing [1 ,2 ]
Lv, Xin [3 ]
Xu, Xueqian [4 ]
Yu, Shui [5 ]
Li, Dawei [2 ]
Chan, Sammy [6 ]
Guizani, Mohsen [7 ,8 ]
机构
[1] Jiangxi Univ Sci & Technol, Ganzhou, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin, Peoples R China
[3] Jiangxi Univ Sci & Technol, Sch Informat Engn, Ganzhou, Peoples R China
[4] East China Normal Univ, Software Engn Inst, Shanghai, Peoples R China
[5] Univ Technol Sydney, Sch Comp Sci, Sydney, NSW, Australia
[6] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[7] Mohamed Bin Zayed Univ Artificial Intelligence, Machine Learning, Abu Dhabi, U Arab Emirates
[8] Mohamed Bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
来源
IEEE NETWORK | 2022年 / 36卷 / 06期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Electronic mail; Phishing; Feature extraction; Hidden Markov models; Deep learning; Data mining; Psychology;
D O I
10.1109/MNET.105.2100425
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, social engineering attacks that use phishing emails as the medium and target specific groups of people have occurred frequently. Current enterprise systems are vulnerable to social engineering attacks. In addition, existing detection methods are relatively ineffective. Therefore, we propose a double-layer detection framework based on deep learning technology. First, a phishing email detection model based on Long Short-Term Memory (LSTM) and extreme gradient boosting tree (XGBoost) is designed from the perspective of individual security. Then, an insider threat detection model based on Bidirectional LSTM and Attention mechanism is designed from the perspective of group security. Finally, combined with the social engineering network attack simulation theory, a social engineering attack and defense simulation platform is established. In the double-layer frame-work, we use Bi-LSTM to obtain long-range dependent features of email body and user sequence information. Then XGBoost and Attention mechanism are used to further strengthen the network structure and improve the classification accuracy. Compared with traditional methods, our model does not require manual feature extraction, and can accurately identify phishing emails and insider threats. Finally, our proposed social engineering simulation platform verifies the effectiveness of the two-layer model. The experimental results show that our proposed framework has the characteristics of timely detection and after-the-fact investigation, which can effectively detect phishing attacks and insider threats faced by enterprise systems.
引用
收藏
页码:92 / 98
页数:7
相关论文
共 13 条
  • [1] Priming and warnings are not effective to prevent social engineering attacks
    Junger, M.
    Montoya, L.
    Overink, F. -J.
    COMPUTERS IN HUMAN BEHAVIOR, 2017, 66 : 75 - 87
  • [2] Factors that Motivate Defense Against Social Engineering Attacks Across Organizations
    Tawalbeh, Lo'ai A.
    Muheidat, Fadi
    18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023, 2023, 224 : 75 - 82
  • [3] Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning
    He, Daojing
    Lv, Xin
    Xu, Xueqian
    Chan, Sammy
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4741 - 4751
  • [4] A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies
    Zaoui, Mohamed
    Yousra, Belfaik
    Yassine, Sadqi
    Yassine, Maleh
    Karim, Ouazzane
    IEEE ACCESS, 2024, 12 : 72224 - 72241
  • [5] Detection Method of Power Quality Disturbance Based on Feature Vector Selection and Double-layer BPNN
    He H.
    Xin Z.
    Wang L.
    Tan F.
    Kong C.
    Gaodianya Jishu/High Voltage Engineering, 2022, 48 (04): : 1237 - 1250
  • [6] GUIDED WAVES-BASED DISBOND DETECTION OF DOUBLE-LAYER PLATES USING LSTM NETWORKS
    Wang, Junzhen
    Qu, Jianmin
    PROCEEDINGS OF 2024 51ST ANNUAL REVIEW OF PROGRESS IN QUANTITATIVE NONDESTRUCTIVE EVALUATION, QNDE2024, 2024,
  • [7] Double-Layer Optimization of Industrial-Park Energy System Based on Discrete Hybrid Automaton
    Qiu, Di
    Liu, Dong
    Gao, Fei
    Lu, Hai
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 7528 - 7536
  • [8] Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System
    Zhou, Xiaokang
    Liang, Wei
    Li, Weimin
    Yan, Ke
    Shimizu, Shohei
    Wang, Kevin I-Kai
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9310 - 9319
  • [9] A Network Intrusion Detection System using Deep Learning against MQTT Attacks in IoT
    Mosaiyebzadeh, Fatemeh
    Araujo Rodriguez, Luis Gustavo
    Batista, Daniel Macedo
    Hirata Jr, R.
    2021 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2021), 2021,
  • [10] Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm
    Susilo, Bambang
    Muis, Abdul
    Sari, Riri Fitri
    SENSORS, 2025, 25 (02)