Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Approaches to modeling development scenarios of multistep social engineering attacks. / Khlobystova, Anastasiia O.; Tulupyev, Alexander L.
Proceedings of 2021 4th International Conference on Control in Technical Systems, CTS 2021. ed. / S. Shaposhnikov. Institute of Electrical and Electronics Engineers Inc., 2021. p. 100-102 (Proceedings of 2021 4th International Conference on Control in Technical Systems, CTS 2021).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
}
TY - GEN
T1 - Approaches to modeling development scenarios of multistep social engineering attacks
AU - Khlobystova, Anastasiia O.
AU - Tulupyev, Alexander L.
N1 - Publisher Copyright: © 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - Now Russian and foreign researchers are actively working on the problem of enhanced information security, specifically protect the organization from social engineering attacks. Which in turn can be direct and multistep. Multistep social engineering attacks are characterized by a chain of users become involved in the attack for obtain the greatest benefit by malefactors. The article focuses on improving approaches to modeling multistep social engineering attacks on the user. This study finds its application in the further design of complex information security management systems of an organization, namely, in the development of an automated complex for identifying the most critical nodes of an information system under social engineering attacks.
AB - Now Russian and foreign researchers are actively working on the problem of enhanced information security, specifically protect the organization from social engineering attacks. Which in turn can be direct and multistep. Multistep social engineering attacks are characterized by a chain of users become involved in the attack for obtain the greatest benefit by malefactors. The article focuses on improving approaches to modeling multistep social engineering attacks on the user. This study finds its application in the further design of complex information security management systems of an organization, namely, in the development of an automated complex for identifying the most critical nodes of an information system under social engineering attacks.
KW - Critical nodes
KW - Development scenario of a multistep social engineering attack
KW - Information system
KW - Social engineering attacks
KW - Social graphs
UR - http://www.scopus.com/inward/record.url?scp=85126221794&partnerID=8YFLogxK
U2 - 10.1109/CTS53513.2021.9562746
DO - 10.1109/CTS53513.2021.9562746
M3 - Conference contribution
AN - SCOPUS:85126221794
T3 - Proceedings of 2021 4th International Conference on Control in Technical Systems, CTS 2021
SP - 100
EP - 102
BT - Proceedings of 2021 4th International Conference on Control in Technical Systems, CTS 2021
A2 - Shaposhnikov, S.
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Control in Technical Systems, CTS 2021
Y2 - 21 September 2021 through 23 September 2021
ER -
ID: 96681917