Aligning social concerns with information system security: A fundamental ontology for social engineering

被引:9
作者
Li, Tong [1 ]
Wang, Xiaowei [2 ]
Ni, Yeming [1 ]
机构
[1] Beijing Univ Technol, Beijing, Peoples R China
[2] Beijing Inst Petrochem Technol, Beijing, Peoples R China
关键词
Social engineering; Ontology; Information system security; Psychology; Attacks; REQUIREMENTS;
D O I
10.1016/j.is.2020.101699
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the rapid development of socio-technical systems, people are playing an increasingly important role in information system and have actually become an essential system component. However, unlike technology-based attacks that have been investigated for decades, social engineering attacks have not been efficiently addressed. In particular, due to the interdisciplinary nature of social engineering, there is a lack of consensus on its definition, hindering the further development of this research field. In this paper, we propose a comprehensive and fundamental ontology of social engineering based on a systematic review of existing social engineering taxonomies and ontologies in order to provide a theoretical foundation for social engineering analysis. The essential contributions of this paper include: (1) propose a comprehensive ontology of social engineering and precisely specify ontological definitions of its essential concepts based on Situation Calculus; (2) enumerate and summarize a set of social engineering techniques and present their fine-grained classification based on the proposed ontology; (3) incorporate psychology and sociology knowledge into social engineering analysis, encapsulating such knowledge in terms of a formalized ontology. We have evaluated our ontology based on a set of real social engineering attacks, the results of which show the usefulness of our proposal. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 32 条
[1]  
Cooper A., 2014, FACE ESSENTIALS INTE
[2]  
Dalpiaz F., 2011, 2011 Workshop on Socio-Technical Aspects in Security and Trust, P1, DOI 10.1109/STAST.2011.6059249
[3]  
Desmet P., 2018, FUNOLOGY, V2, P391, DOI DOI 10.1007/978-3-319-68213-6_25
[4]  
Foozy Mohd., 2011, Malaysian Technical Universities International Conference on Engineering Technology, P1
[5]  
Giorgini P, 2005, LECT NOTES COMPUT SC, V3655, P237
[6]  
Gulati R., 2003, SANS Reading Room
[7]  
Harley D., 1998, European Institute for Computer Antivirus Research, P4
[8]  
Ivaturi K., 2011, INT C INF RES MAN, P1
[9]  
Janczewski L. J., 2010, Proceedings 2010 International Multiconference on Computer Science and Information Technology (IMCSIT 2010), P847
[10]  
Jurjens J., 2002, "UML" 2002 - Unified Modeling Language. Model Engineering, Concepts, and Tools. 5th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2460), P412