SEADer: A Social Engineering Attack Detection Method Based on Natural Language Processing and Artificial Neural Networks

被引:4
作者
Lansley, Merton [1 ]
Polatidis, Nikolaos [1 ]
Kapetanakis, Stelios [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton BN2 4GJ, E Sussex, England
来源
COMPUTATIONAL COLLECTIVE INTELLIGENCE, PT I | 2019年 / 11683卷
关键词
Social engineering; Attack detection; Online chat environments; Natural language processing; Neural networks; Cybersecurity;
D O I
10.1007/978-3-030-28377-3_57
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social engineering attacks are one of the most well-known and easiest to apply attacks in the cybersecurity domain. Research has shown that the majority of attacks against computer systems was based on the use of social engineering methods. Considering the importance of emerging fields such as machine learning and cybersecurity we have developed a method that detects social engineering attacks that is based on natural language processing and artificial neural networks. This method can be applied in offline texts or online environments and flag a conversation as a social engineering attack or not. Initially, the conversation text is parsed and checked for grammatical errors using natural language processing techniques and then an artificial neural network is used to classify possible attacks. The proposed method has been evaluated using a real dataset and a semi-synthetic dataset with very high accuracy results. Furthermore, alternative classification methods have been used for comparisons in both datasets.
引用
收藏
页码:686 / 696
页数:11
相关论文
共 20 条
  • [1] Abed-Alguni B. H., 2019, International Journal of Artificial Intelligence, V17, P57
  • [2] Bezuidenhout M., 2010, 2010 INFORM SECURITY
  • [3] Bhakta R., 2015, P 2015 IEEE 9 INT C
  • [4] The science of persuasion
    Cialdini, RB
    [J]. SCIENTIFIC AMERICAN, 2001, 284 (02) : 76 - 81
  • [5] Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
    Heartfield, Ryan
    Loukas, George
    [J]. COMPUTERS & SECURITY, 2018, 76 : 101 - 127
  • [6] Hoeschele M, 2006, INT FED INFO PROC, V194, P67
  • [7] Hoeschele M., 2006, 200615 CERIAS
  • [8] Jamil A, 2018, IEEE INT CONF BIG DA, P5040, DOI 10.1109/BigData.2018.8622505
  • [9] Advanced social engineering attacks
    Krombholz, Katharina
    Hobel, Heidelinde
    Huber, Markus
    Weippl, Edgar
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 (113-122) : 113 - 122
  • [10] The Stanford CoreNLP Natural Language Processing Toolkit
    Manning, Christopher D.
    Surdeanu, Mihai
    Bauer, John
    Finkel, Jenny
    Bethard, Steven J.
    McClosky, David
    [J]. PROCEEDINGS OF 52ND ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: SYSTEM DEMONSTRATIONS, 2014, : 55 - 60