Multi-layered graph-based model for social engineering vulnerability assessment

被引:1
作者
Jaafor, Omar [1 ]
Birregah, Babiga [1 ]
机构
[1] Univ Technol Troyes, Charles Delaunay Inst, UMR CNRS 6281, Troyes, France
来源
PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015) | 2015年
关键词
social engineering; vulnerability assessment; multi-layered networks; social networks; graph-based models;
D O I
10.1145/2808797.2808899
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As technological and operational security measures for the protection of information systems are being widely adopted, it is much easier for a malicious user to launch an attack on an information system's weakest link, the humans operating it. Despite the damage that these attacks can cause, they are rarely taken into account in vulnerability assessment models. These models usually focus on representing the internal states of an information system, whereas social engineering attacks often start by gathering information and building relationships with the potential victims, which tends to occur outside an information system's gates. Hence, a model assessing social engineering threats should be able to account for the different channels which could be used to approach victims (professional mail, personnel mail, on-line social networks,. etc). Although security professionals might not monitor some of the channels leveraged in an attack, a comprehensive vulnerability assessment model would allow the assessment of the likelihood and cost of a successful breach and tailor a security awareness programs to avoid it. We describe in this paper a multi-layered graph-based model for social engineering vulnerability assessment. We then present case studies in which vulnerabilities in an automated social engineering attack and an automated reverse social engineering attack in addition to vulnerabilities from interactions in different social networking sites, blogs and forums are assessed using this model.
引用
收藏
页码:1480 / 1488
页数:9
相关论文
共 29 条
[1]  
Acquisti A., 2005, Proceedings of WPES05, P71, DOI DOI 10.1145/1102199.1102214
[2]  
Ammann Paul, 2002, P 9 ACM C COMP COMM, P217, DOI DOI 10.1145/586110.586140
[3]  
[Anonymous], 2003, ART DECEPTION CONTRO
[4]   The structure and dynamics of multilayer networks [J].
Boccaletti, S. ;
Bianconi, G. ;
Criado, R. ;
del Genio, C. I. ;
Gomez-Gardenes, J. ;
Romance, M. ;
Sendina-Nadal, I. ;
Wang, Z. ;
Zanin, M. .
PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS, 2014, 544 (01) :1-122
[5]   Modeling the multi-layer nature of the European Air Transport Network: Resilience and passengers re-scheduling under random failures [J].
Cardillo, Alessio ;
Zanin, Massimiliano ;
Gomez-Gardenes, Jesus ;
Romance, Miguel ;
Garcia del Amo, Alejandro J. ;
Boccaletti, Stefano .
EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2013, 215 (01) :23-33
[6]  
Dolan A., 2004, SOCIAL ENG, P18
[7]  
Gragg D., 2002, MULTILEVEL DEFENSE S
[8]  
Granger S., 2001, Security Focus
[9]  
Heikkinen S., 2006, P WIRELESS WORLD RES, P1
[10]  
Huber M., 2009, 2009 INT C COMP SCI, V3