Social Engineering Attacks: A Survey

被引:183
作者
Salahdine, Fatima [1 ]
Kaabouch, Naima [1 ]
机构
[1] Univ North Dakota, Sch Elect Engn & Comp Sci, Grand Forks, ND 58202 USA
关键词
social engineering attacks; cyber security; phishing; vishing; spear phishing; scams; baiting; robocalls; SECURITY;
D O I
10.3390/fi11040089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.
引用
收藏
页数:17
相关论文
共 71 条
[1]  
Abeywardana KY, 2016, PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), P1054, DOI 10.1109/SAI.2016.7556108
[2]  
Abramov MV, 2016, PROCEEDINGS OF THE XIX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM 2016), P58, DOI 10.1109/SCM.2016.7519682
[3]  
Albladi S., 2016, IEEE INT C CYB COMP, P1, DOI DOI 10.1109/ICCCF.2016.7740435
[4]  
Algarni A, 2013, INT CONF INTERNET, P508, DOI 10.1109/ICIST.2013.6747602
[5]   Measuring Source Credibility of Social Engineering Attackers on Facebook [J].
Algarni, Abdullah ;
Xu, Yue ;
Chan, Taizan .
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, :3686-3695
[6]   Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes [J].
Ali, Bako ;
Awad, Ali Ismail .
SENSORS, 2018, 18 (03)
[7]  
Alqatawna J., 2017, Social Media Shaping e-Publishing and Academia, P121, DOI 10.1007/978-3-319-55354-2_10
[8]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[9]  
[Anonymous], 2016, 2016 INT C CYBER SEC
[10]  
[Anonymous], 2016, PROC IEEE 17 INT WOR