Analysis of Recent Attacks based on Social Engineering Techniques

by   V. Y. Sokolov, et al.

This paper attempts to strengthen the pursued research on social engineering (SE) threat identification, and control, by means of the author's illustrated classification, which includes attack types, determining the degree of possible harm to each types of possible, known attacks, countermeasures by types of threats that leads to loss of personal or corporate confidential information (user id, passwords, closed documentation). Further, this analytical study will become the starting point for deeper, practically oriented and tested research.


Threat Detection for General Social Engineering Attack Using Machine Learning Techniques

This paper explores the threat detection for general Social Engineering ...

Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples

Social engineering has posed a serious threat to cyberspace security. To...

Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study

Social engineering attacks are phenomena that are equally applicable to ...

Social engineering: Concepts, Techniques and Security Countermeasures

The purpose of this report is to research the topic called Social Engine...

Encoding a Taxonomy of Web Attacks with Different-Length Vectors

Web attacks, i.e. attacks exclusively using the HTTP protocol, are rapid...

Towards Thwarting Social Engineering Attacks

Social engineering attacks represent an increasingly important attack ve...

Bot Development for Social Engineering Attacks on Twitter

A series of bots performing simulated social engineering attacks using p...