Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis

02/27/2023
by   Glynn Rogers, et al.
0

Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/18/2021

A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues

These days, cyber-criminals target humans rather than machines since the...
research
05/28/2021

Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples

Social engineering has posed a serious threat to cyberspace security. To...
research
02/21/2019

Analysis of Recent Attacks based on Social Engineering Techniques

This paper attempts to strengthen the pursued research on social enginee...
research
01/16/2020

Social Engineering Resistant 2FA

Attackers increasingly, and with high success rates, use social engineer...
research
06/04/2023

Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy

Social media has drastically reshaped the world that allows billions of ...
research
06/04/2019

Power Law Public Goods Game for Personal Information Sharing in News Comments

We propose a public goods game model of user sharing in an online commen...
research
09/26/2021

Extracting and Inferring Personal Attributes from Dialogue

Personal attributes represent structured information about a person, suc...

Please sign up or login with your details

Forgot password? Click here to reset