Draining the Water Hole: Mitigating Social Engineering Attacks

01/03/2019
by   Zheyuan Ryan Shi, et al.
0

Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users. One clever technique, the "watering hole" attack, compromises a legitimate website to execute drive-by download attacks by redirecting users to another malicious domain. We introduce a game-theoretic model that captures the salient aspects for an organization protecting itself from a watering hole attack by altering the environment information in web traffic so as to deceive the attackers. Our main contributions are (1) a novel Social Engineering Deception (SED) game model that features a continuous action set for the attacker, (2) an in-depth analysis of the SED model to identify computationally feasible real-world cases, and (3) an iterative algorithm which solves for the optimal protection policy using (i) a characterization of websites that may be compromised, (ii) an LP-relaxation with optimality condition, and (iii) the column generation method. A Chrome extension is being built to field our algorithms in the real world.

READ FULL TEXT
research
01/03/2019

Towards Thwarting Social Engineering Attacks

Social engineering attacks represent an increasingly important attack ve...
research
07/30/2021

Winning the Ransomware Lottery: A Game-Theoretic Model for Mitigating Ransomware Attacks

Ransomware is a growing threat to individuals and enterprises alike, con...
research
12/07/2022

How Cyber Criminal Use Social Engineering To Target Organizations

Social engineering is described as the art of manipulation. Cybercrimina...
research
01/29/2021

Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective

Data sharing between different organizations is an essential process in ...
research
08/30/2019

Social Engineering in a Post-Phishing Era: Ambient Tactical Deception Attacks

It is an ordinary day working from home, and you are part of a team that...
research
10/02/2019

Detecting and Characterizing Lateral Phishing at Scale

We present the first large-scale characterization of lateral phishing at...
research
08/25/2018

Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game

In recent years, state-of-the-art traffic-control devices have evolved f...

Please sign up or login with your details

Forgot password? Click here to reset