首页> 外文期刊>Computers & Security >Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
【24h】

Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework

机译:检测链接最薄弱的语义社会工程学攻击:“人为安全传感器”框架的实现和经验评估

获取原文
获取原文并翻译 | 示例

摘要

The notion that the human user is the weakest link in information security has been strongly, and, we argue, rightly contested in recent years. Here, we take a step further showing that the human user can in fact be the strongest link for detecting attacks that involve deception, such as application masquerading, spearphishing, WiFi evil twin and other types of semantic social engineering. Towards this direction, we have developed a human-as-a-security-sensor framework and a practical implementation in the form of Cogni-Sense, a Microsoft Windows prototype application, designed to allow and encourage users to actively detect and report semantic social engineering attacks against them. Experimental evaluation with 26 users of different profiles running Cogni-Sense on their personal computers for a period of 45 days has shown that human sensors can consistently outperform technical security systems. Making use of a machine learning based approach, we also show that the reliability of each report, and consequently the performance of each human sensor, can be predicted in a meaningful and practical manner. In an organisation that employs a human-as-a-security-sensor implementation, such as Cogni-Sense, an attack is considered to have been detected if at least one user has reported it. In our evaluation, a small organisation consisting only of the 26 participants of the experiment would have exhibited a missed detection rate below 10%, down from 81% if only technical security systems had been used. The results strongly point towards the need to actively involve the user not only in prevention through cyber hygiene and user-centric security design, but also in active cyber threat detection and reporting. (C) 2018 Elsevier Ltd. All rights reserved.
机译:人们认为,人类用户是信息安全中最薄弱的环节这一观念在最近几年受到了强烈的反对,我们认为这是正确的。在这里,我们进一步采取措施,表明人类用户实际上可以成为检测涉及欺骗的攻击的最强链接,例如应用程序伪装,鱼叉式欺骗,WiFi邪恶孪生和其他类型的语义社会工程。朝着这个方向,我们已经开发了一种人为安全传感器框架,并以Microsoft Windows原型应用程序Cogni-Sense的形式开发了一种实用的实现,旨在允许和鼓励用户积极地检测和报告语义社会工程学攻击他们。对26位不同配置文件的用户在其个人计算机上运行Cogni-Sense的产品进行了为期45天的实验评估表明,人体传感器可以始终胜过技术安全系统。利用基于机器学习的方法,我们还表明可以以有意义和实用的方式预测每个报告的可靠性以及每个人类传感器的性能。在采用像人一样安全的传感器实现的组织(例如Cogni-Sense)中,如果至少有一个用户报告了此攻击,则认为已检测到攻击。在我们的评估中,一个仅由26名参与者组成的小型组织的漏检率将低于10%,低于仅使用技术安全系统的漏检率(81%)。结果强烈表明,不仅需要使用户积极参与网络卫生和以用户为中心的安全设计,还需要积极参与网络威胁检测和报告。 (C)2018 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号