Defending against social engineering attacks: A security pattern-based analysis framework

被引:1
|
作者
Li, Tong [1 ]
Song, Chuanyong [1 ]
Pang, Qinyu [1 ]
机构
[1] Beijing Univ Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
fraud; pattern matching; personnel; USER ACCEPTANCE;
D O I
10.1049/ise2.12125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social engineering attacks are a growing threat to modern complex systems. Increasingly, attackers are exploiting people's "vulnerabilities" to carry out social engineering attacks for malicious purposes. Although such a severe threat has attracted the attention of academia and industry, it is challenging to propose a comprehensive and practical set of countermeasures to protect systems from social engineering attacks due to its interdisciplinary nature. Moreover, the existing social engineering defence research is highly dependent on manual analysis, which is time-consuming and labour-intensive and cannot solve practical problems efficiently and pragmatically. This paper proposes a systematic approach to generate countermeasures based on a typical social engineering attack process. Specifically, we systematically 'attack' each step of social engineering attacks to prevent, mitigate, or eliminate them, resulting in 62 countermeasures. We have designed a set of social engineering security patterns that encapsulate relevant security knowledge to provide practical assistance in the defence analysis of social engineering attacks. Finally, we present an automatic analysis framework for applying social engineering security patterns. We applied the case study method and performed semi-structured interviews with nine participants to evaluate our proposal, showing that our approach effectively defended against social engineering attacks.
引用
收藏
页码:703 / 726
页数:24
相关论文
共 50 条
  • [41] Expert Systems in Information Security: A Comprehensive Exploration of Awareness Strategies Against Social Engineering Attacks
    Cardoso, Waldson Rodrigues
    Lima Ribeiro, Admilson de Ribamar
    Cardoso da Silva, Joao Marco
    GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, WORLDCIST 2024, 2024, 986 : 34 - 43
  • [42] Pattern-based clustering and attribute analysis
    Gabriela Alexe
    Sorin Alexe
    Peter L. Hammer
    Soft Computing, 2006, 10 : 442 - 452
  • [43] A Pattern-Based, Design Framework for Designing Collaborative Environments
    Wang, Yixiao
    Green, Keith Evan
    TEI'19: PROCEEDINGS OF THE THIRTEENTH INTERNATIONAL CONFERENCE ON TANGIBLE, EMBEDDED, AND EMBODIED INTERACTION, 2019, : 595 - 604
  • [44] A Pattern-Based Framework for Addressing Data Representational Inconsistency
    Yi, Bingyu
    Hua, Wen
    Sadiq, Shazia
    DATABASES THEORY AND APPLICATIONS, (ADC 2016), 2016, 9877 : 395 - 406
  • [45] Pattern-based clustering and attribute analysis
    Alexe, G
    Alexe, S
    Hammer, PL
    SOFT COMPUTING, 2006, 10 (05) : 442 - 452
  • [46] Variable masking pattern-based QR codes for high security
    Pasala, Anjaneyulu
    Mukherjee, Subhro
    10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES, CONECCT 2024, 2024,
  • [47] Pattern-based System of Systems Engineering Approach for Resilient and Sustainable Production Networks - A Review and Framework Proposal
    Niemeyer, Jan Felix
    Dormeier, Christopher
    Mennenga, Mark
    2024 19TH ANNUAL SYSTEM OF SYSTEMS ENGINEERING CONFERENCE, SOSE 2024, 2024, : 10 - 17
  • [48] \Addressing security challenges in cloud computing a pattern-based approach
    Anand, Priya
    Ryoo, Jungwoo
    Kim, Hyoungshick
    PROCEEDINGS 2015 FIRST INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2015), 2015, : 13 - 18
  • [49] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Mohammadi, Payam
    Ghaffari, Ali
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 365 - 376
  • [50] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Payam Mohammadi
    Ali Ghaffari
    Wireless Personal Communications, 2019, 106 : 365 - 376