Modelling of the social engineering attacks based on social graph of employees communications analysis
@article{Suleimanov2018ModellingOT, title={Modelling of the social engineering attacks based on social graph of employees communications analysis}, author={A. Suleimanov and M. Abramov and A. Tulupyev}, journal={2018 IEEE Industrial Cyber-Physical Systems (ICPS)}, year={2018}, pages={801-805} }
The article is aimed at solving the problem of constructing and analyzing a compressed social graph, taking into account the estimates of the probability of a transition of the intruder's influence from user to user. The subject of the study are user accounts in the social network VKontakte as the basis for building user interaction and social graphs on them. Due to the peculiarities of the graphs under consideration, processing them is a very time-consuming task, requiring large computational… CONTINUE READING
Figures and Topics from this paper
Figures
9 Citations
Social Influence on the User in Social Network: Types of Communications in Assessment of the Behavioral Risks connected with the Socio-engineering Attacks
- Computer Science
- 2019
- 1
- PDF
Randomized General Indices for Evaluating Damage Through Malefactor Social Engineering Attacks
- Computer Science
- 2019
Algebraic Bayesian Networks: Empirical Estimates of the Sensitivity of Local Posteriori Inference
- Computer Science
- 2020 XXIII International Conference on Soft Computing and Measurements (SCM)
- 2020
Algebraic Bayesian Networks: the Complexity of Consistency Checking
- Computer Science
- 2020 XXIII International Conference on Soft Computing and Measurements (SCM)
- 2020
References
SHOWING 1-10 OF 13 REFERENCES
Approaches to development of models for text analysis of information in social network profiles in order to evaluate user's vulnerabilities profile
- Computer Science
- 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)
- 2017
- 6
- Highly Influential
Community-Structured Evolutionary Game for Privacy Protection in Social Networks
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2018
- 32
- PDF
Hybridization of computational intelligence methods for attack detection in computer networks
- Computer Science
- J. Comput. Sci.
- 2017
- 19
- PDF
Information systems security practices in social software applications: A systematic literature review
- Computer Science
- Aslib J. Inf. Manag.
- 2017
- 3
- PDF
Parallel Processing of Big Heterogeneous Data for Security Monitoring of IoT Networks
- Computer Science
- 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)
- 2017
- 9
Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network
- Computer Science
- 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)
- 2017
- 3
Fighting against phishing attacks: state of the art and future challenges
- Computer Science
- Neural Computing and Applications
- 2016
- 97
Generation of Source Data for Experiments with Network Attack Detection Software
- Computer Science
- 2017
- 5
A digital memories based user authentication scheme with privacy preservation
- Computer Science, Medicine
- PloS one
- 2017
- 6
- PDF