Standard

An approach to estimating of criticality of social engineering attacks traces. / Khlobystova, Anastasiia ; Abramov, Maxim ; Tulupyev, Alexander .

Recent Research in Control Engineering and Decision Making: Conference proceedings ICIT 2019. Cham : Springer Nature, 2019. p. 446-456 (Studies in Systems, Decision and Control; Vol. 199).

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Harvard

Khlobystova, A, Abramov, M & Tulupyev, A 2019, An approach to estimating of criticality of social engineering attacks traces. in Recent Research in Control Engineering and Decision Making: Conference proceedings ICIT 2019. Studies in Systems, Decision and Control, vol. 199, Springer Nature, Cham, pp. 446-456, International Conference on Information Technologies: Information and Communication Technologies for Research and Industry (ICIT-2019), Саратов, Russian Federation, 7/02/19. https://doi.org/10.1007/978-3-030-12072-6_36

APA

Khlobystova, A., Abramov, M., & Tulupyev, A. (2019). An approach to estimating of criticality of social engineering attacks traces. In Recent Research in Control Engineering and Decision Making: Conference proceedings ICIT 2019 (pp. 446-456). (Studies in Systems, Decision and Control; Vol. 199). Springer Nature. https://doi.org/10.1007/978-3-030-12072-6_36

Vancouver

Khlobystova A, Abramov M, Tulupyev A. An approach to estimating of criticality of social engineering attacks traces. In Recent Research in Control Engineering and Decision Making: Conference proceedings ICIT 2019. Cham: Springer Nature. 2019. p. 446-456. (Studies in Systems, Decision and Control). https://doi.org/10.1007/978-3-030-12072-6_36

Author

Khlobystova, Anastasiia ; Abramov, Maxim ; Tulupyev, Alexander . / An approach to estimating of criticality of social engineering attacks traces. Recent Research in Control Engineering and Decision Making: Conference proceedings ICIT 2019. Cham : Springer Nature, 2019. pp. 446-456 (Studies in Systems, Decision and Control).

BibTeX

@inproceedings{344eaa770bca4870a0994da4329bd074,
title = "An approach to estimating of criticality of social engineering attacks traces",
abstract = "In this article we propose to consider the trajectories of social engineering attacks, which are the most critical from the point of view of the expected damage to the organization, and not from the point of view of the probability of success of the defeat of the user and, indirectly, critical documents to which he has access. The article proposes an approach to solving the problem of identifying the most critical path of multiway socio-engineering attack. The most critical trajectory in this article is understood as the most probable trajectory of the attack, which will bring the greatest damage to the organization. As a further development of the research direction, we can consider models that describe in more detail the context and take into account the distribution of the probability of hitting the proportion of documents available to the user, offering models for building integrated damage estimates associated with the affected user, various access policies and accounting for the hierarchy of documents in terms of their criticality or value.",
keywords = "multi-pass social engineering attacks, social graph of company employees, critical trajectories in social graph, social engineering attacks, users protect, information security, Critical trajectories in social graph, Information security, Multi-pass social engineering attacks, Social engineering attacks, Social graph of company employees, Users protect",
author = "Anastasiia Khlobystova and Maxim Abramov and Alexander Tulupyev",
note = "Khlobystova A., Abramov M., Tulupyev A. (2019) An Approach to Estimating of Criticality of Social Engineering Attacks Traces. In: Dolinina O., Brovko A., Pechenkin V., Lvov A., Zhmud V., Kreinovich V. (eds) Recent Research in Control Engineering and Decision Making. ICIT 2019. Studies in Systems, Decision and Control, vol 199. Springer, Cham; null ; Conference date: 07-02-2019 Through 08-02-2019",
year = "2019",
doi = "10.1007/978-3-030-12072-6_36",
language = "English",
isbn = "9783030120719",
series = "Studies in Systems, Decision and Control",
publisher = "Springer Nature",
pages = "446--456",
booktitle = "Recent Research in Control Engineering and Decision Making",
address = "Germany",
url = "http://icit2019.sstu.ru/eng/index.html",

}

RIS

TY - GEN

T1 - An approach to estimating of criticality of social engineering attacks traces

AU - Khlobystova, Anastasiia

AU - Abramov, Maxim

AU - Tulupyev, Alexander

N1 - Khlobystova A., Abramov M., Tulupyev A. (2019) An Approach to Estimating of Criticality of Social Engineering Attacks Traces. In: Dolinina O., Brovko A., Pechenkin V., Lvov A., Zhmud V., Kreinovich V. (eds) Recent Research in Control Engineering and Decision Making. ICIT 2019. Studies in Systems, Decision and Control, vol 199. Springer, Cham

PY - 2019

Y1 - 2019

N2 - In this article we propose to consider the trajectories of social engineering attacks, which are the most critical from the point of view of the expected damage to the organization, and not from the point of view of the probability of success of the defeat of the user and, indirectly, critical documents to which he has access. The article proposes an approach to solving the problem of identifying the most critical path of multiway socio-engineering attack. The most critical trajectory in this article is understood as the most probable trajectory of the attack, which will bring the greatest damage to the organization. As a further development of the research direction, we can consider models that describe in more detail the context and take into account the distribution of the probability of hitting the proportion of documents available to the user, offering models for building integrated damage estimates associated with the affected user, various access policies and accounting for the hierarchy of documents in terms of their criticality or value.

AB - In this article we propose to consider the trajectories of social engineering attacks, which are the most critical from the point of view of the expected damage to the organization, and not from the point of view of the probability of success of the defeat of the user and, indirectly, critical documents to which he has access. The article proposes an approach to solving the problem of identifying the most critical path of multiway socio-engineering attack. The most critical trajectory in this article is understood as the most probable trajectory of the attack, which will bring the greatest damage to the organization. As a further development of the research direction, we can consider models that describe in more detail the context and take into account the distribution of the probability of hitting the proportion of documents available to the user, offering models for building integrated damage estimates associated with the affected user, various access policies and accounting for the hierarchy of documents in terms of their criticality or value.

KW - multi-pass social engineering attacks, social graph of company employees, critical trajectories in social graph, social engineering attacks, users protect, information security

KW - Critical trajectories in social graph

KW - Information security

KW - Multi-pass social engineering attacks

KW - Social engineering attacks

KW - Social graph of company employees

KW - Users protect

UR - http://www.scopus.com/inward/record.url?scp=85061352551&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-12072-6_36

DO - 10.1007/978-3-030-12072-6_36

M3 - Conference contribution

SN - 9783030120719

T3 - Studies in Systems, Decision and Control

SP - 446

EP - 456

BT - Recent Research in Control Engineering and Decision Making

PB - Springer Nature

CY - Cham

Y2 - 7 February 2019 through 8 February 2019

ER -

ID: 50725977