Modelling of the social engineering attacks based on social graph of employees communications analysis

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

9 Scopus citations

Abstract

The article is aimed at solving the problem of constructing and analyzing a compressed social graph, taking into account the estimates of the probability of a transition of the intruder's influence from user to user. The subject of the study are user accounts in the social network VKontakte as the basis for building user interaction and social graphs on them. Due to the peculiarities of the graphs under consideration, processing them is a very time-consuming task, requiring large computational resources. In order to optimize the algorithm of the analyzer being developed, the authors of this article conducted a study aimed at modifying the analysis module, with the purpose of diluting the social graph of staff interaction to optimize the process of its further processing. In this paper, we investigate various approaches to diminishing the dimension of edges of a graph, describe their weak and strong sides for the purpose of choosing the optimal graph dilution algorithm. The construction and analysis of the social graph will make it possible to calculate estimates of the security of users of the information system from social engineering attacks and also to analyze the trajectories of the spread of social engineering attacks.

Original languageEnglish
Title of host publicationProceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages801-805
Number of pages5
ISBN (Electronic)9781538665312
DOIs
StatePublished - 15 Jun 2018
Event1st IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2018 - Saint Petersburg, Russian Federation
Duration: 15 May 201818 May 2018

Conference

Conference1st IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2018
CountryRussian Federation
CitySaint Petersburg
Period15/05/1818/05/18

Scopus subject areas

  • Artificial Intelligence
  • Hardware and Architecture
  • Control and Optimization
  • Industrial and Manufacturing Engineering

Keywords

  • Information security
  • Psychological vulnerabilities
  • Social engineering attacks
  • Social engineering attacks modelling
  • Social Graph of Employees
  • Users protect

Fingerprint Dive into the research topics of 'Modelling of the social engineering attacks based on social graph of employees communications analysis'. Together they form a unique fingerprint.

Cite this