A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

被引:95
|
作者
Heartfield, Ryan [1 ]
Loukas, George [1 ]
机构
[1] Univ Greenwich, Old Royal Naval Coll, Comp & Informat Syst, Greenwich SE10 9LS, England
关键词
Security; Social Engineering; Computer crime; social engineering attacks; semantic attacks; survey; CYBER SECURITY; AWARENESS;
D O I
10.1145/2835375
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Commonly observed examples include obfuscated URLs, phishing emails, drive-by downloads, spoofed websites and scareware to name a few. This article presents a taxonomy of semantic attacks, as well as a survey of applicable defences. By contrasting the threat landscape and the associated mitigation techniques in a single comparative matrix, we identify the areas where further research can be particularly beneficial.
引用
收藏
页数:39
相关论文
共 50 条
  • [1] A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies
    Zaoui, Mohamed
    Yousra, Belfaik
    Yassine, Sadqi
    Yassine, Maleh
    Karim, Ouazzane
    IEEE ACCESS, 2024, 12 : 72224 - 72241
  • [2] A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies
    Birthriya, Santosh Kumar
    Ahlawat, Priyanka
    Jain, Ankit Kumar
    JOURNAL OF APPLIED SECURITY RESEARCH, 2024,
  • [3] Social Engineering Attacks: A Survey
    Salahdine, Fatima
    Kaabouch, Naima
    FUTURE INTERNET, 2019, 11 (04)
  • [4] Taxonomy of Social Engineering Attacks: A Survey of Trends and Future Directions
    Maraj, Arianit
    Butler, William
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 185 - 193
  • [5] Coronavirus Social Engineering Attacks: Issues and Recommendations
    Alzahrani, Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (05) : 154 - 161
  • [6] A taxonomy and survey of attacks against machine learning
    Pitropakis, Nikolaos
    Panaousis, Emmanouil
    Giannetsos, Thanassis
    Anastasiadis, Eleftherios
    Loukas, George
    COMPUTER SCIENCE REVIEW, 2019, 34
  • [7] Advanced social engineering attacks
    Krombholz, Katharina
    Hobel, Heidelinde
    Huber, Markus
    Weippl, Edgar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 (113-122) : 113 - 122
  • [8] You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks
    Heartfield, Ryan
    Loukas, George
    Gan, Diane
    IEEE ACCESS, 2016, 4 : 6910 - 6928
  • [9] A taxonomy and survey of attacks on digital signatures
    Hernandez-Ardieta, Jorge L.
    Gonzalez-Tablas, Ana I.
    de Fuentes, Jose M.
    Ramos, Benjamin
    COMPUTERS & SECURITY, 2013, 34 : 67 - 112
  • [10] Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
    Longtchi, Theodore Tangie
    Rodriguez, Rosana Montanez
    Al-Shawaf, Laith
    Atyabi, Adham
    Xu, Shouhuai
    PROCEEDINGS OF THE IEEE, 2024, 112 (03) : 210 - 246