Modelling of the social engineering attacks based on social graph of employees communications analysis

@article{Suleimanov2018ModellingOT,
  title={Modelling of the social engineering attacks based on social graph of employees communications analysis},
  author={Alexei Suleimanov and Maksim Abramov and Alexander L. Tulupyev},
  journal={2018 IEEE Industrial Cyber-Physical Systems (ICPS)},
  year={2018},
  pages={801-805}
}
The article is aimed at solving the problem of constructing and analyzing a compressed social graph, taking into account the estimates of the probability of a transition of the intruder's influence from user to user. The subject of the study are user accounts in the social network VKontakte as the basis for building user interaction and social graphs on them. Due to the peculiarities of the graphs under consideration, processing them is a very time-consuming task, requiring large computational… 

Figures from this paper

Social Influence on the User in Social Network: Types of Communications in Assessment of the Behavioral Risks connected with the Socio-engineering Attacks

The results obtained, demonstrating the lack of differentiation of values within groups of types of relationships, are significant, but at the same time, a deeper study of the orders that can be traced in the responses of a number of respondents is required.

An Approach to Estimating of Criticality of Social Engineering Attacks Traces

The article proposes an approach to solving the problem of identifying the most critical path of multiway socio-engineering attack, understood as the most probable trajectory of the attack, which will bring the greatest damage to the organization.

An Approach to Quantification of Relationship Types Between Users Based on the Frequency of Combinations of Non-numeric Evaluations

An approach to linguistic values quantification is proposed and an example of its application to the relationship types between users in the popular social network in Russia “VK” is considered.

Vulnerability detection towards protecting intrusion by Social Network Analysis approach

  • A. Abdul Rasheed
  • Computer Science
    2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)
  • 2021
This paper has applied information diffusion as social networking approach to detect vulnerable node(s) in the network environment using an Intrusion Detection Evaluation (IDE) dataset used to detect such vulnerable nodes.

Effectiveness of Placing Attack Detection Detectors

A statistical formal model based on Markov chains in combination with vulnerability analysis metrics, which allows identifying critical nodes along the path of access to the target node that makes it possible to install immune detectors on these nodes in order to improve the protection system.

Randomized General Indices for Evaluating Damage Through Malefactor Social Engineering Attacks

The method of randomized general indices is used in a comparative analysis of the effectiveness of various measures aimed at increasing the level of user protection from the malefactor's social engineering attacks.

Artificial Intelligence: 17th Russian Conference, RCAI 2019, Ulyanovsk, Russia, October 21–25, 2019, Proceedings

A formal model of social network users who have definite sets of interests in different subjects that can be used not only to describe the interaction of users of social networks, but also in modeling the transfer of heterogeneous information in telecommunications networks.

Event Characteristics of Crypto Currency and Security

  • Jin-Keun Hong
  • Computer Science, Mathematics
    International Journal of Recent Technology and Engineering
  • 2019
The amount of Google data retrieval around specific keywords during a specific period is analyzed and the relevance of this keyword to specific keywords related to security is analysis.

Social Engineering and Technical Security Fusion

A message security scheme that is based on social engineering and technical security fusion is proposed that makes use of traditional cryptographic algorithms and LSB steganography in addition to ideas pooling from the ever advancing field of social engineering.

Algebraic Bayesian Networks: Empirical Estimates of the Sensitivity of Local Posteriori Inference

Empirical estimates of the sensitivity of the second task of a posteriori inference in a knowledge pattern are studied, since ABS is one of the few models that can work with inaccurate data.

References

SHOWING 1-10 OF 13 REFERENCES

Approaches to development of models for text analysis of information in social network profiles in order to evaluate user's vulnerabilities profile

This paper discusses one of the approaches to search and collect user's public information in an automated fashion on the example of social network VK.com and prototyping of the software for text information analysis for evaluation degrees of vulnerabilities included into the user's vulnerabilities profile was presented.

Community-Structured Evolutionary Game for Privacy Protection in Social Networks

Experiments show that the proposed framework is effective in modeling the users’ relationships and privacy protection behaviors and can help social network managers to design appropriate security service and payment mechanisms to encourage their users to take the privacy protection, which can promote the spreading of privacy behavior throughout the network.

Hybridization of computational intelligence methods for attack detection in computer networks

Fighting against phishing attacks: state of the art and future challenges

This paper discusses in detailphishing attacks, history of phishing attacks and motivation of attacker behind performing this attack, and provides taxonomy of various solutions proposed in the literature to detect and defend fromPhishing attacks.

Generation of Source Data for Experiments with Network Attack Detection Software

The paper suggests a new approach for traffic generation and the architecture of the software tool for evaluation of attack detection and response mechanisms and Threshold Random Walk was chosen and implemented.

A digital memories based user authentication scheme with privacy preservation

A Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment is proposed.

Advances in Intelligent Systems and Computing

The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general.

Adaptive systems of automatic control with prioritized channels

Adaptive automatic control system with prioritized channels was presented in the article. The expressions for the signal deviations from the predetermined boundary in the priority channels for

Social engineering attacks: problems of analysis

  • SPb: Science,
  • 2016

Parallel Processing of Big Heteroge-neous Data for Security Monitoring of IoT Networks //Parallel

  • Distributed and Network-based Processing (PDP),
  • 2017