Defending against social engineering attacks: A security pattern-based analysis framework

被引:1
|
作者
Li, Tong [1 ]
Song, Chuanyong [1 ]
Pang, Qinyu [1 ]
机构
[1] Beijing Univ Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
fraud; pattern matching; personnel; USER ACCEPTANCE;
D O I
10.1049/ise2.12125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social engineering attacks are a growing threat to modern complex systems. Increasingly, attackers are exploiting people's "vulnerabilities" to carry out social engineering attacks for malicious purposes. Although such a severe threat has attracted the attention of academia and industry, it is challenging to propose a comprehensive and practical set of countermeasures to protect systems from social engineering attacks due to its interdisciplinary nature. Moreover, the existing social engineering defence research is highly dependent on manual analysis, which is time-consuming and labour-intensive and cannot solve practical problems efficiently and pragmatically. This paper proposes a systematic approach to generate countermeasures based on a typical social engineering attack process. Specifically, we systematically 'attack' each step of social engineering attacks to prevent, mitigate, or eliminate them, resulting in 62 countermeasures. We have designed a set of social engineering security patterns that encapsulate relevant security knowledge to provide practical assistance in the defence analysis of social engineering attacks. Finally, we present an automatic analysis framework for applying social engineering security patterns. We applied the case study method and performed semi-structured interviews with nine participants to evaluate our proposal, showing that our approach effectively defended against social engineering attacks.
引用
收藏
页码:703 / 726
页数:24
相关论文
共 50 条
  • [21] A pattern-based framework for software anomaly detection
    Kothari, SC
    Bishop, L
    Sauceda, J
    Daugherty, G
    SOFTWARE QUALITY JOURNAL, 2004, 12 (02) : 99 - 120
  • [22] A Pattern-Based Framework for Software Anomaly Detection
    S.C. Kothari
    Luke Bishop
    Jeremias Sauceda
    Gary Daugherty
    Software Quality Journal, 2004, 12 : 99 - 120
  • [23] A Pattern-Based Framework for Uncertainty Representation in Ontologies
    Vacura, Miroslav
    Svatek, Vojtech
    Smrz, Pavel
    TEXT, SPEECH AND DIALOGUE, PROCEEDINGS, 2008, 5246 : 227 - +
  • [24] Towards a pattern-based model transformation framework
    Rouhi, Alireza
    Lano, Kevin
    SOFTWARE-PRACTICE & EXPERIENCE, 2023, 53 (09): : 1815 - 1849
  • [25] PBit - A pattern-based testing framework for iptables
    Du, Y
    Hoffman, D
    SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 107 - 112
  • [26] Pattern-based framework for multimedia distributed applications
    Gievska, S
    Jordanoski, S
    Trajkovic, V
    Davcev, D
    TOOLS 23 - TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 1998, : 31 - 36
  • [27] Survey of Practical Security Frameworks for Defending SIP Based VoIP Systems against DoS/DDoS Attacks
    Armoogum, Sheeba
    Mohamudally, Nawaz
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [28] Pattern-based Approach to Modelling and Verifying System Security
    Zheng, Xiaoyu
    Liu, Dongmei
    Zhu, Hong
    Bayley, Ian
    2020 14TH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2020), 2020, : 92 - 102
  • [29] Explainability to the Rescue: A Pattern-Based Approach for Detecting Adversarial Attacks
    Das, Sanjay
    Kundu, Shamik
    Basu, Kanad
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 160 - 170
  • [30] PBC: A Software Framework Facilitating Pattern-Based Clustering for Microarray Data Analysis
    Shin, Dong-Guk
    Hong, Seung-Hyun
    Joshi, Pujan
    Nori, Ravi
    Pei, Baikang
    Wang, Hsin-Wei
    Harrington, Patrick
    Kuo, Lynn
    Kalajzic, Ivo
    Rowe, David
    2009 INTERNATIONAL JOINT CONFERENCE ON BIOINFORMATICS, SYSTEMS BIOLOGY AND INTELLIGENT COMPUTING, PROCEEDINGS, 2009, : 30 - +