A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

被引:95
|
作者
Heartfield, Ryan [1 ]
Loukas, George [1 ]
机构
[1] Univ Greenwich, Old Royal Naval Coll, Comp & Informat Syst, Greenwich SE10 9LS, England
关键词
Security; Social Engineering; Computer crime; social engineering attacks; semantic attacks; survey; CYBER SECURITY; AWARENESS;
D O I
10.1145/2835375
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Commonly observed examples include obfuscated URLs, phishing emails, drive-by downloads, spoofed websites and scareware to name a few. This article presents a taxonomy of semantic attacks, as well as a survey of applicable defences. By contrasting the threat landscape and the associated mitigation techniques in a single comparative matrix, we identify the areas where further research can be particularly beneficial.
引用
收藏
页数:39
相关论文
共 50 条
  • [41] Social Engineering Attacks Prevention: A Systematic Literature Review
    Syafitri, Wenni
    Shukur, Zarina
    Mokhtar, Umi Asma'
    Sulaiman, Rossilawati
    Ibrahim, Muhammad Azwan
    IEEE ACCESS, 2022, 10 : 39325 - 39343
  • [42] Priming and warnings are not effective to prevent social engineering attacks
    Junger, M.
    Montoya, L.
    Overink, F. -J.
    COMPUTERS IN HUMAN BEHAVIOR, 2017, 66 : 75 - 87
  • [43] PERSUADED: Fighting Social Engineering Attacks with a Serious Game
    Aladawy, Dina
    Beckers, Kristian
    Pape, Sebastian
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2018, 11033 : 103 - 118
  • [44] Solutions for counteracting human deception in social engineering attacks
    Campbell, Curtis C.
    INFORMATION TECHNOLOGY & PEOPLE, 2019, 32 (05) : 1130 - 1152
  • [45] TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks
    Hafner, Lukas
    Wutz, Florian
    Poehn, Daniela
    Hommel, Wolfgang
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [46] Defence Against Code Injection Attacks
    Alnabulsi, Hussein
    Mamun, Quazi
    Islam, Rafiqul
    Chowdhury, Morshed U.
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 237 - 251
  • [47] semantic web attacks and countermeasures
    Kumar, Sumit
    Kumar, Suresh
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [48] User characteristics that influence judgment of social engineering attacks in social networks
    Albladi, Samar Muslah
    Weir, George R. S.
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2018, 8
  • [49] A Taxonomy of Attacks Using BGP Blackholing
    Miller, Loic
    Pelsser, Cristel
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 107 - 127
  • [50] A Taxonomy of Distributed Denial of Service Attacks
    De Donno, Michele
    Giaretta, Alberto
    Dragoni, Nicola
    Spognardi, Angelo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, : 100 - 107