Abstract

In this article we propose to consider the trajectories of social engineering attacks, which are the most critical from the point of view of the expected damage to the organization, and not from the point of view of the probability of success of the defeat of the user and, indirectly, critical documents to which he has access. The article proposes an approach to solving the problem of identifying the most critical path of multiway socio-engineering attack. The most critical trajectory in this article is understood as the most probable trajectory of the attack, which will bring the greatest damage to the organization. As a further development of the research direction, we can consider models that describe in more detail the context and take into account the distribution of the probability of hitting the proportion of documents available to the user, offering models for building integrated damage estimates associated with the affected user, various access policies and accounting for the hierarchy of documents in terms of their criticality or value.
Original languageEnglish
Title of host publicationRecent Research in Control Engineering and Decision Making
Subtitle of host publicationConference proceedings ICIT 2019
Place of PublicationCham
PublisherSpringer Nature
Pages446-456
ISBN (Electronic)9783030120726
ISBN (Print)9783030120719
DOIs
Publication statusPublished - 2019
EventInternational Conference on Information Technologies: Information and Communication Technologies for Research and Industry (ICIT-2019) - Саратов
Duration: 7 Feb 20198 Feb 2019
http://icit2019.sstu.ru/eng/index.html

Publication series

NameStudies in Systems, Decision and Control
PublisherSpringer
Volume199
ISSN (Print)2198-4182

Conference

ConferenceInternational Conference on Information Technologies: Information and Communication Technologies for Research and Industry (ICIT-2019)
Abbreviated titleICIT-2019
CountryRussian Federation
CityСаратов
Period7/02/198/02/19
Internet address

Scopus subject areas

  • Computer Science (miscellaneous)
  • Control and Optimization
  • Decision Sciences (miscellaneous)
  • Economics, Econometrics and Finance (miscellaneous)
  • Control and Systems Engineering
  • Automotive Engineering
  • Social Sciences (miscellaneous)

Fingerprint Dive into the research topics of 'An approach to estimating of criticality of social engineering attacks traces'. Together they form a unique fingerprint.

  • Cite this

    Khlobystova, A., Abramov, M., & Tulupyev, A. (2019). An approach to estimating of criticality of social engineering attacks traces. In Recent Research in Control Engineering and Decision Making: Conference proceedings ICIT 2019 (pp. 446-456). (Studies in Systems, Decision and Control; Vol. 199). Springer Nature. https://doi.org/10.1007/978-3-030-12072-6_36