A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

被引:95
|
作者
Heartfield, Ryan [1 ]
Loukas, George [1 ]
机构
[1] Univ Greenwich, Old Royal Naval Coll, Comp & Informat Syst, Greenwich SE10 9LS, England
关键词
Security; Social Engineering; Computer crime; social engineering attacks; semantic attacks; survey; CYBER SECURITY; AWARENESS;
D O I
10.1145/2835375
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Commonly observed examples include obfuscated URLs, phishing emails, drive-by downloads, spoofed websites and scareware to name a few. This article presents a taxonomy of semantic attacks, as well as a survey of applicable defences. By contrasting the threat landscape and the associated mitigation techniques in a single comparative matrix, we identify the areas where further research can be particularly beneficial.
引用
收藏
页数:39
相关论文
共 50 条
  • [21] A Mathematical Model for Risk Assessment of Social Engineering Attacks
    Sandor, Andrei
    Tont, Gabriela
    Simion, Eduard
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2022, 11 (01): : 334 - 338
  • [22] Mobile phishing attacks and defence mechanisms: State of art and open research challenges
    Goel, Diksha
    Jain, Ankit Kumar
    COMPUTERS & SECURITY, 2018, 73 : 519 - 544
  • [23] A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges
    Rathod, Tejal
    Jadav, Nilesh Kumar
    Tanwar, Sudeep
    Alabdulatif, Abdulatif
    Garg, Deepak
    Singh, Anupam
    INFORMATION PROCESSING & MANAGEMENT, 2025, 62 (01)
  • [24] A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids
    Reda, Haftu Tasew
    Anwar, Adnan
    Mahmood, Abdun Naser
    Tari, Zahir
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [25] Reverse Social Engineering Attacks in Online Social Networks
    Irani, Danesh
    Balduzzi, Marco
    Balzarotti, Davide
    Kirda, Engin
    Pu, Calton
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 55 - +
  • [26] Social Engineering Attacks: Recent Advances and Challenges
    Mashtalyar, Nikol
    Ntaganzwa, Uwera Nina
    Santos, Thales
    Hakak, Saqib
    Ray, Suprio
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST (HCI-CPT 2021), 2021, 12788 : 417 - 431
  • [27] Identification and prevention of social engineering attacks on an enterprise
    Parthy, Purushotham Parthiban
    Rajendran, Gowthamaraj
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [28] Towards Effective Assessment for Social Engineering Attacks
    Li, Tong
    Wang, Kaiyuan
    Horkoff, Jennifer
    2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019), 2019, : 392 - 397
  • [29] Research of Social Engineering Attacks in Telecommunications Fraud
    Chen, Guangxuan
    Zhou, Guomin
    Mao, Zhoujie
    Liu, Qiang
    Zheng, Ziwan
    Chen, Guangxiao
    Qin, Panke
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, EDUCATION MANAGEMENT AND SPORTS EDUCATION, 2015, 39 : 1885 - 1888
  • [30] Social Engineering Attacks A Reconnaissance Synthesis Analysis
    Arabia-Obedoza, Maha Rita
    Rodriguez, Gloria
    Johnston, Amber
    Salahdine, Fatima
    Kaabouch, Naima
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 843 - 848