Employees’ Social Graph Analysis: A Model of Detection the Most Criticality Trajectories of the Social Engineering Attack’s Spread

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Abstract

In this research we present the hybrid model of finding the most critical distribution trajectories of multipath Social engineering attacks, passing through which by the malefactor on a global basis has the topmost degree of probability and will bring the greatest loss to the company. The solution of search problem concerning the most critical trajectories rests upon the assumption that the estimated probabilities of the direct Social engineering attack on user, degree evaluation of documents’ criticality, the estimated probabilities of Social engineering attack’s distribution from user to user are premised on linguistic indistinct variables are already calculated. The described model finds its application at creation when constructing the estimates of information systems users’ safety against Social engineering attacks and promotes well-timed informing of decision-makers on the vulnerabilities which being available in system.

Original languageEnglish
Title of host publicationPROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19)
EditorsS Kovalev, Tarassov, Snasel, A Sukhanov
PublisherSpringer Nature
Pages198-205
Number of pages8
ISBN (Print)9783030500962
DOIs
StatePublished - 1 Jan 2020
Event4th International Scientific Conference on Intelligent Information Technologies for Industry, IITI 2019 - Ostrava-Prague, Czech Republic
Duration: 2 Dec 20197 Dec 2019

Publication series

NameAdvances in Intelligent Systems and Computing
PublisherSPRINGER INTERNATIONAL PUBLISHING AG
Volume1156
ISSN (Print)2194-5357

Conference

Conference4th International Scientific Conference on Intelligent Information Technologies for Industry, IITI 2019
CountryCzech Republic
CityOstrava-Prague
Period2/12/197/12/19

Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Keywords

  • Analysis of social graph of company employees
  • Finding of the most criticality trajectory of the spread multiway social engineering attack
  • Hybrid model of linguistic fuzzy variable
  • Multiway social engineering attacks
  • Propagation of the multiway social engineering attack
  • Social engineering

Fingerprint Dive into the research topics of 'Employees’ Social Graph Analysis: A Model of Detection the Most Criticality Trajectories of the Social Engineering Attack’s Spread'. Together they form a unique fingerprint.

Cite this