首页> 外文OA文献 >You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks
【2h】

You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks

机译:您可能不是最薄弱的一环:朝着语义社会工程学攻击易感性的实际预测迈进

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Semantic social engineering attacks are a pervasive threat to computer and communication systems. By employing deception rather than by exploiting technical vulnerabilities, spear-phishing, obfuscated URLs, drive-by downloads, spoofed websites, scareware, and other attacks are able to circumvent traditional technical security controls and target the user directly. Our aim is to explore the feasibility of predicting user susceptibility to deception-based attacks through attributes that can be measured, preferably in real-time and in an automated manner. Toward this goal, we have conducted two experiments, the first on 4333 users recruited on the Internet, allowing us to identify useful high-level features through association rule mining, and the second on a smaller group of 315 users, allowing us to study these features in more detail. In both experiments, participants were presented with attack and non-attack exhibits and were tested in terms of their ability to distinguish between the two. Using the data collected, we have determined practical predictors of users' susceptibility against semantic attacks to produce and evaluate a logistic regression and a random forest prediction model, with the accuracy rates of. 68 and. 71, respectively. We have observed that security training makes a noticeable difference in a user's ability to detect deception attempts, with one of the most important features being the time since last self-study, while formal security education through lectures appears to be much less useful as a predictor. Other important features were computer literacy, familiarity, and frequency of access to a specific platform. Depending on an organisation's preferences, the models learned can be configured to minimise false positives or false negatives or maximise accuracy, based on a probability threshold. For both models, a threshold choice of 0.55 would keep both false positives and false negatives below 0.2.
机译:语义社会工程学攻击是对计算机和通信系统的普遍威胁。通过采用欺骗手段而不是利用技术漏洞,鱼叉式网络钓鱼,混淆的URL,过分下载,欺骗性网站,安全软件和其他攻击都可以绕过传统的技术安全控制并直接针对用户。我们的目标是探索通过可测量的属性(最好是实时和自动的)来预测用户对基于欺骗的攻击的敏感性的可行性。为了实现这一目标,我们进行了两个实验,第一个实验是在互联网上招募的4333个用户,这使我们能够通过关联规则挖掘来识别有用的高级功能,第二个实验是在315个较小的用户群中,使我们能够研究这些功能更详细。在这两个实验中,向参与者展示了攻击性和非攻击性的展览,并根据他们区分两者的能力进行了测试。使用收集到的数据,我们确定了用户对语义攻击的敏感性的实用预测指标,以产生和评估逻辑回归和随机森林预测模型,其准确率达到。 68和。 71。我们已经观察到,安全培训对用户检测欺​​骗企图的能力产生了显着差异,其中最重要的功能之一是自上次自学以来的时间,而通过讲座进行的正式安全教育作为预测因子的作用似乎要小得多。其他重要功能包括计算机素养,熟悉程度和访问特定平台的频率。根据组织的偏好,可以基于概率阈值将学习到的模型配置为最小化误报或误报或最大化准确性。对于这两种模型,阈值选择为0.55会使误报率和误报率都保持在0.2以下。

著录项

相似文献

  • 外文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号