An Effective Double-Layer Detection System Against Social Engineering Attacks

被引:4
|
作者
He, Daojing [1 ,2 ]
Lv, Xin [3 ]
Xu, Xueqian [4 ]
Yu, Shui [5 ]
Li, Dawei [2 ]
Chan, Sammy [6 ]
Guizani, Mohsen [7 ,8 ]
机构
[1] Jiangxi Univ Sci & Technol, Ganzhou, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin, Peoples R China
[3] Jiangxi Univ Sci & Technol, Sch Informat Engn, Ganzhou, Peoples R China
[4] East China Normal Univ, Software Engn Inst, Shanghai, Peoples R China
[5] Univ Technol Sydney, Sch Comp Sci, Sydney, NSW, Australia
[6] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[7] Mohamed Bin Zayed Univ Artificial Intelligence, Machine Learning, Abu Dhabi, U Arab Emirates
[8] Mohamed Bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
来源
IEEE NETWORK | 2022年 / 36卷 / 06期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Electronic mail; Phishing; Feature extraction; Hidden Markov models; Deep learning; Data mining; Psychology;
D O I
10.1109/MNET.105.2100425
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, social engineering attacks that use phishing emails as the medium and target specific groups of people have occurred frequently. Current enterprise systems are vulnerable to social engineering attacks. In addition, existing detection methods are relatively ineffective. Therefore, we propose a double-layer detection framework based on deep learning technology. First, a phishing email detection model based on Long Short-Term Memory (LSTM) and extreme gradient boosting tree (XGBoost) is designed from the perspective of individual security. Then, an insider threat detection model based on Bidirectional LSTM and Attention mechanism is designed from the perspective of group security. Finally, combined with the social engineering network attack simulation theory, a social engineering attack and defense simulation platform is established. In the double-layer frame-work, we use Bi-LSTM to obtain long-range dependent features of email body and user sequence information. Then XGBoost and Attention mechanism are used to further strengthen the network structure and improve the classification accuracy. Compared with traditional methods, our model does not require manual feature extraction, and can accurately identify phishing emails and insider threats. Finally, our proposed social engineering simulation platform verifies the effectiveness of the two-layer model. The experimental results show that our proposed framework has the characteristics of timely detection and after-the-fact investigation, which can effectively detect phishing attacks and insider threats faced by enterprise systems.
引用
收藏
页码:92 / 98
页数:7
相关论文
共 50 条
  • [1] A double-layer detection and classification approach for network attacks
    Sun, Chong
    Lv, Kun
    Hu, Changzhen
    Xie, Hui
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [2] OBSERVATION EVIDENCE AGAINST DOUBLE-LAYER
    LIN, CS
    HOFFMAN, RA
    TRANSACTIONS-AMERICAN GEOPHYSICAL UNION, 1977, 58 (06): : 477 - 477
  • [3] Towards Effective Assessment for Social Engineering Attacks
    Li, Tong
    Wang, Kaiyuan
    Horkoff, Jennifer
    2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019), 2019, : 392 - 397
  • [4] BIODEGRADABLE DOUBLE-LAYER CELL CARRIERS FOR TISSUE ENGINEERING
    An, Jia
    Chua, Chee Kai
    Leong, Kah Fai
    FIRST INTERNATIONAL SYMPOSIUM ON BIOENGINEERING (ISOB 2011), PROCEEDINGS, 2011, : 323 - 329
  • [5] Effective interactions in twisted double-layer graphene in a microcavity
    Ardenghi, Juan Sebastian
    JOURNAL OF PHYSICS-CONDENSED MATTER, 2020, 32 (34)
  • [6] Feature Engineering Method Using Double-Layer Hidden Markov Model for Insider Threat Detection
    Ye, Xiaoyun
    Hong, Sung-Sam
    Han, Myung-Mook
    INTERNATIONAL JOURNAL OF FUZZY LOGIC AND INTELLIGENT SYSTEMS, 2020, 20 (01) : 17 - 25
  • [7] Excitonic condensation in a double-layer graphene system
    Kharitonov, Maxim Yu
    Efetov, Konstantin B.
    SEMICONDUCTOR SCIENCE AND TECHNOLOGY, 2010, 25 (03)
  • [8] DOUBLE-LAYER PLASMA SHAPING COIL SYSTEM
    OHYABU, N
    BULLETIN OF THE AMERICAN PHYSICAL SOCIETY, 1977, 22 (09): : 1126 - 1126
  • [9] PHASE SHIFT ON REFLECTION AT A DOUBLE-LAYER SYSTEM
    SERAPHIN, BO
    JOURNAL OF THE OPTICAL SOCIETY OF AMERICA, 1962, 52 (08) : 912 - &
  • [10] Priming and warnings are not effective to prevent social engineering attacks
    Junger, M.
    Montoya, L.
    Overink, F. -J.
    COMPUTERS IN HUMAN BEHAVIOR, 2017, 66 : 75 - 87