Draining the water hole: Mitigating social engineering attacks with cybertweak

2Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users. One clever technique, the "watering hole"attack, compromises a legitimate website to execute drive-by download attacks by redirecting users to another malicious domain. We introduce a game-theoretic model that captures the salient aspects for an organization protecting itself from a watering hole attack by altering the environment information in web traffic so as to deceive the attackers. Our main contributions are (1) a novel Social Engineering Deception (SED) game model that features a continuous action set for the attacker, (2) an in-depth analysis of the SED model to identify computationally feasible real-world cases, and (3) the CYBERTWEAK algorithm which solves for the optimal protection policy. To illustrate the potential use of our framework, we built a browser extension based on our algorithms which is now publicly available online. The CYBERTWEAK extension will be vital to the continued development and deployment of countermeasures for social engineering.

Cite

CITATION STYLE

APA

Shi, Z. R., Schlenker, A., Hay, B., Bittleston, D., Gao, S., Peterson, E., … Fang, F. (2020). Draining the water hole: Mitigating social engineering attacks with cybertweak. In AAAI 2020 - 34th AAAI Conference on Artificial Intelligence (pp. 13363–13368). AAAI press. https://doi.org/10.1609/aaai.v34i08.7050

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free