Recently the attacks on information systems began to occur more frequently and there are serious costs
and the attacks require more time to investigate such crimes. At the same time the share of social engineering attacks
among successful incidents related to the information security violation is growing. For this the general objective of the
research direction is seen as the automated construction of assessments of the user security of information systems against
socio-engineering attacks. One of the tasks within the movement towards this aim is to develop approaches for identifying
the most critical trajectories of complex socio-engineering attacks proliferation performed through the chain of
information system users. To search for such trajectories, the oriented social graphs of employees are used.
Translated title of the contributionIDENTIFYING THE MOST CRITICAL TRAJECTORIES OF THE SPREAD OF A MULTI-PASS SOCIAL ENGINEERING ATTACKS
Original languageRussian
Title of host publicationРегиональная информатика (РИ-2018). XVI Санкт-Петербургская международная конференция «Региональная информатика (РИ-2018)». Санкт-Петербург, 24-26 октября 2018 г.
Subtitle of host publicationМатериалы конференции
Place of PublicationСПб.
PublisherСанкт-Петербургское Общество информатики, вычислительной техники, систем связи и управления
Pages561-562
ISBN (Print)978–5–907050–44–0
StatePublished - 2018
EventXVI Санкт-Петербургская международная конференция «Региональная информатика (РИ-2018)» - Санкт-Петербург, Russian Federation
Duration: 24 Oct 201826 Oct 2018

Conference

ConferenceXVI Санкт-Петербургская международная конференция «Региональная информатика (РИ-2018)»
Country/TerritoryRussian Federation
CityСанкт-Петербург
Period24/10/1826/10/18

    Research areas

  • Information Security, socio-engineering attacks, multi-pass socio-engineering attacks, social graph of company employees, critical trajectories in social graph, user protection

ID: 36937440