An Analysis of Various Social Engineering Attack in Social Network using Machine Learning Algorithm

被引:0
|
作者
Al-dablan, Dalal [1 ]
Al-hamad, Amal [1 ]
Al-Bahlal, Raghad [1 ]
Badawi, Maria Altaib [1 ]
机构
[1] Majmaah Univ, Dept Comp Sci & Informat, Coll Sci, Al Zulfi 15941, Saudi Arabia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2020年 / 20卷 / 10期
关键词
Social Engineering; Social engineering attacks; J48; algorithm; Uniform Resource Locator (URL);
D O I
10.22937/IJCSNS.2020.20.10.7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
"Social engineering explains how one can use the human mind for capturing useful information about organizations or individuals." With tremendous growth of internet, attack cases are increasing each day along with the modern attack method, and It targets emotional parts of human to gain access to controlled area or achieve sensitive information for various purposes. Since there is neither hardware or software available to protect an enterprise or individual against social engineering, it is essential that good practices be implemented . The overall purpose of this research is to highlight the different social engineering attacks and how they can prevent in social network because Social engineering is one of the biggest problems in social network, a concern the privacy and security. And we have another problem on social networks, that it is difficult for users to judge if a friend request is trustworthy or not, and always users of online social networks tend to exhibit a higher degree of trust in friend requests and messages sent by other users, Social engineering lead to increase the Incorporate threats, fear and a sense of urgency in an attempt to manipulate the user into responding quickly. For this purpose, we will use J48 algorithm to implement a detection algorithm for social engineering attacks in URL links. Thereafter, this project is using a set of data then analysis it using the Weka tool, to defend against these attack J48 approach is very simple and effective in decreasing the false alarm ratio and improving the intrusion detection accuracy. The potential estimate of J48 algorithm is to help in an effective detection of probable attacks which could jeopardies the social engineering confidentiality, also this proposed technique could classify the data as either normal or abnormal. This project presents the algorithm, that will help create a safer and more reliable computing environment around the world for our next generation.
引用
收藏
页码:46 / 49
页数:4
相关论文
共 50 条
  • [1] Social Engineering Attack Classifications on Social Media Using Deep Learning
    Aun, Yichiet
    Gan, Ming-Lee
    Wahab, Nur Haliza Binti Abdul
    Guan, Goh Hock
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 4917 - 4931
  • [2] SEADer plus plus : social engineering attack detection in online environments using machine learning
    Lansley, Merton
    Mouton, Francois
    Kapetanakis, Stelios
    Polatidis, Nikolaos
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2020, 4 (03) : 346 - 362
  • [3] How users tweet about a cyber attack: An explorative study using machine learning and social network analysis
    Vogler, Daniel
    Meissner, Florian
    JOURNAL OF DIGITAL MEDIA & POLICY, 2020, 11 (02) : 195 - 214
  • [4] Using social learning in network engineering curricula
    Sousa-Vieira, M. E.
    Lopez-Ardao, J. C.
    Lopez-Garcia, C.
    Rodriguez-Perez, M.
    Lopez-Ardao, J. C.
    PROCEEDINGS OF 2015 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON), 2015, : 471 - 478
  • [5] Forecasting Future Research Trends in the Construction Engineering and Management Domain Using Machine Learning and Social Network Analysis
    Ali, Gasser G.
    El-adaway, Islam H.
    Ahmed, Muaz O.
    Eissa, Radwa
    Nabi, Mohamad Abdul
    Elbashbishy, Tamima
    Khalef, Ramy
    MODELLING, 2024, 5 (02): : 438 - 457
  • [6] Parallel Computing for Machine Learning in Social Network Analysis
    Cybenko, George
    2017 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2017, : 1464 - 1471
  • [7] Grouping Partners for Cooperative Learning Using Genetic Algorithm and Social Network Analysis
    Chen, Rong-Chang
    Chen, Shih-Ying
    Fan, Jyun-You
    Chen, Yen-Ting
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 3888 - 3893
  • [8] Cooperative Learning Using Social Network Analysis
    Wei Hantian
    Wang Furong
    INFORMATION AND MANAGEMENT ENGINEERING, PT V, 2011, 235 : 511 - +
  • [9] Analysis of Social Engineering Threats with Attack Graphs
    Beckers, Kristian
    Krautsevich, Leanid
    Yautsiukhin, Artsiom
    DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 216 - 232
  • [10] Predicting Social Network Measures using Machine Learning Approach
    Michalski, Radoslaw
    Kazienko, Przemyslaw
    Krol, Dawid
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 1056 - 1059