An approach to estimating of criticality of social engineering attacks traces

13Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this article we propose to consider the trajectories of social engineering attacks, which are the most critical from the point of view of the expected damage to the organization, and not from the point of view of the probability of success of the defeat of the user and, indirectly, critical documents to which he has access. The article proposes an approach to solving the problem of identifying the most critical path of multiway socio-engineering attack. The most critical trajectory in this article is understood as the most probable trajectory of the attack, which will bring the greatest damage to the organization. As a further development of the research direction, we can consider models that describe in more detail the context and take into account the distribution of the probability of hitting the proportion of documents available to the user, offering models for building integrated damage estimates associated with the affected user, various access policies and accounting for the hierarchy of documents in terms of their criticality or value.

Cite

CITATION STYLE

APA

Khlobystova, A., Abramov, M., & Tulupyev, A. (2019). An approach to estimating of criticality of social engineering attacks traces. In Studies in Systems, Decision and Control (Vol. 199, pp. 446–456). Springer International Publishing. https://doi.org/10.1007/978-3-030-12072-6_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free