Defending against social engineering attacks: A security pattern-based analysis framework

被引:1
|
作者
Li, Tong [1 ]
Song, Chuanyong [1 ]
Pang, Qinyu [1 ]
机构
[1] Beijing Univ Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
fraud; pattern matching; personnel; USER ACCEPTANCE;
D O I
10.1049/ise2.12125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social engineering attacks are a growing threat to modern complex systems. Increasingly, attackers are exploiting people's "vulnerabilities" to carry out social engineering attacks for malicious purposes. Although such a severe threat has attracted the attention of academia and industry, it is challenging to propose a comprehensive and practical set of countermeasures to protect systems from social engineering attacks due to its interdisciplinary nature. Moreover, the existing social engineering defence research is highly dependent on manual analysis, which is time-consuming and labour-intensive and cannot solve practical problems efficiently and pragmatically. This paper proposes a systematic approach to generate countermeasures based on a typical social engineering attack process. Specifically, we systematically 'attack' each step of social engineering attacks to prevent, mitigate, or eliminate them, resulting in 62 countermeasures. We have designed a set of social engineering security patterns that encapsulate relevant security knowledge to provide practical assistance in the defence analysis of social engineering attacks. Finally, we present an automatic analysis framework for applying social engineering security patterns. We applied the case study method and performed semi-structured interviews with nine participants to evaluate our proposal, showing that our approach effectively defended against social engineering attacks.
引用
收藏
页码:703 / 726
页数:24
相关论文
共 50 条
  • [1] A Pattern-Based General Security Framework An eBusiness Case Study
    Benameur, Azzedine
    Fenet, Serge
    Saidane, Ayda
    Sinha, Smriti Kumar
    HPCC: 2009 11TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2009, : 339 - +
  • [2] Enhanced social engineering framework mitigating against social engineering attacks in higher education
    Matyokurehwa, Kanos
    Rudhumbu, Norman
    Gombiro, Cross
    Chipfumbu-Kangara, Colletor
    SECURITY AND PRIVACY, 2022, 5 (05):
  • [3] A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities
    Wu, Jun
    Ota, Kaoru
    Dong, Mianxiong
    Li, Chunxiao
    IEEE ACCESS, 2016, 4 : 416 - 424
  • [4] A Framework for Defending Embedded Systems Against Software Attacks
    Aaraj, Najwa
    Raghunathan, Anand
    Jha, Niraj K.
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2011, 10 (03)
  • [5] Pattern-based guidelines for coordination engineering
    Etcheverry, P
    Lopistéguy, P
    Dagorret, P
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, 2001, 2113 : 155 - 164
  • [6] A Pattern-Based Ontology Engineering Platform
    Janke, Thomas
    PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON KNOWLEDGE MANAGEMENT, VOLS 1 AND 2, 2011, : 461 - 469
  • [7] A Framework for Pattern-Based Global Models
    Giacometti, Arnaud
    Miyaneh, Eynollah Khanjari
    Marcel, Patrick
    Soulet, Arnaud
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, PROCEEDINGS, 2009, 5788 : 433 - 440
  • [8] A Blockchain-based Federated Learning Framework for Defending Against Poisoning Attacks in IIOT
    Xie, Jiale
    Feng, Libo
    Fang, Fake
    Yuan, Zehui
    Deng, Xian
    Liu, Junhong
    Wu, Peng
    Li, Zhuo
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2442 - 2447
  • [9] SMART VEHICLE SECURITY SYSTEM FOR DEFENDING AGAINST COLLABRATIVE ATTACKS BY MALWARE
    Ramaiah, Chandra Shekar
    Hussain, S. Asif
    Hussain, S. Zahid
    Al Balushi, Yahya
    2016 3RD MEC INTERNATIONAL CONFERENCE ON BIG DATA AND SMART CITY (ICBDSC), 2016, : 289 - 293
  • [10] A framework for conceptualizing social engineering attacks
    Gonzalez, Jose J.
    Sarriegi, Jose M.
    Gurrutxaga, Alazne
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 79 - +