Modelling of the social engineering attacks based on social graph of employees communications analysis

Результат исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучнаярецензирование

9 Цитирования (Scopus)

Аннотация

The article is aimed at solving the problem of
constructing and analyzing a compressed social graph, taking into
account the estimates of the probability of a transition of the
intruder’s influence from user to user. The subject of the study are
user accounts in the social network VKontakte as the basis for
building user interaction and social graphs on them. Due to the
peculiarities of the graphs under consideration, processing them is a
very time-consuming task, requiring large computational resources.
In order to optimize the algorithm of the analyzer being developed,
the authors of this article conducted a study aimed at modifying the
analysis module, with the purpose of diluting the social graph of staff
interaction to optimize the process of its further processing. In this
paper, we investigate various approaches to diminishing the
dimension of edges of a graph, describe their weak and strong sides
for the purpose of choosing the optimal graph dilution algorithm.
The construction and analysis of the social graph will make it
possible to calculate estimates of the security of users of the
information system from social engineering attacks and also to
analyze the trajectories of the spread of social engineering attacks.
Язык оригиналаанглийский
Название основной публикацииProceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018
ИздательInstitute of Electrical and Electronics Engineers Inc.
Страницы801-805
Число страниц5
ISBN (электронное издание)9781538665312
DOI
СостояниеОпубликовано - 15 июн 2018
Событие1st IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2018 - Saint Petersburg, Российская Федерация
Продолжительность: 15 мая 201818 мая 2018

конференция

конференция1st IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2018
СтранаРоссийская Федерация
ГородSaint Petersburg
Период15/05/1818/05/18

Предметные области Scopus

  • Искусственный интеллект
  • Аппаратное обеспечение и архитектура ЭВМ
  • Теория оптимизации
  • Промышленная технология и станкостроение

Ключевые слова

  • social engineering attacks
  • Social Graph of Employees
  • social engineering attacks modelling
  • Psychological vulnerabilities
  • information security
  • users protect

Fingerprint

Подробные сведения о темах исследования «Modelling of the social engineering attacks based on social graph of employees communications analysis». Вместе они формируют уникальный семантический отпечаток (fingerprint).

Цитировать