Skip to main content
Top

Soft Estimates of User Protection from Social Engineering Attacks

Fuzzy Combination of User Vulnerabilities and Malefactor Competencies in the Attacking Impact Success Prediction

  • 2019
  • OriginalPaper
  • Chapter
Published in:

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The material is devoted to solving an individual task of the research aimed at automating the construction of estimates of protection of users and, indirectly, critical documents from social engineering attacks. This issue is closely related to soft social computing. Also the estimates of protection of users are the basis of building a expert system, which can substitute for a social engineering specialist. The material describes the models of the following: the malefactor, the user, the relationships between them, the critical document, the information system, all of which represent the basic entities necessary for simulating social engineering attacks and building appropriate attack trees. Here we propose an approach to estimating the probability of a successful social engineering attacking impact by a malefactor on the user, based on the use of triangular norms. The conclusion is reached that in conditions of a lack of information for soft estimates at this stage, t-norms may be applicable, since, firstly, they provide the expected properties of a combination of the malefactor’s competency and user vulnerability models, secondly, they are not computationally difficult and, thirdly, in a number of cases allow for an understandable interpretation within the proposed area.
The work was carried out as part of the project according to the state task SPIIRAS No. 0073-2019-0003, with financial support from the Russian Foundation for Basic Research, project No. 18-01-00626—Methods for representation, truth estimates synthesis, and machine learning in algebraic Bayesian networks and related models of knowledge with uncertainty: probabilistic-logic approach and graph systems; Project No. 18-37-00323—Social engineering attacks in corporate information systems: approaches, methods and algorithms for identifying the most probable traces.

Not a customer yet? Then find out more about our access models now:

Individual Access

Start your personal individual access now. Get instant access to more than 164,000 books and 540 journals – including PDF downloads and new releases.

Starting from 54,00 € per month!    

Get access

Access for Businesses

Utilise Springer Professional in your company and provide your employees with sound specialist knowledge. Request information about corporate access now.

Find out how Springer Professional can uplift your work!

Contact us now
Title
Soft Estimates of User Protection from Social Engineering Attacks
Authors
Maxim V. Abramov
Alexander L. Tulupyev
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-34518-1_4
This content is only visible if you are logged in and have the appropriate permissions.

Premium Partner

    Image Credits
    Neuer Inhalt/© ITandMEDIA, Nagarro GmbH/© Nagarro GmbH, AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, USU GmbH/© USU GmbH, Ferrari electronic AG/© Ferrari electronic AG