SlideShare a Scribd company logo
1 of 3
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. V (Nov – Dec. 2015), PP 76-78
www.iosrjournals.org
DOI: 10.9790/0661-17657678 www.iosrjournals.org 76 | Page
Automatic Detection of Social Engineering Attacks Using Dialog
Pooja kale, Shital Kashiwant, Nisha Kamble, Subodh Awate
Prof. Sonali Tidke
Department of Computer Engineering Pimpri Chinchwad College of Engineering, Nigdi, pune.
Abstract: Cyber attacker target the weakest part of security system which is increasingly the people who use
and interact with a computer-based system is the easiest way for cyber attacker to attack the user. A separate
research area is provided in order to protect computer assets. But by exploiting human vulnerabilities, an
attacker can find a way for many computer-based defences. Phishing is the most common attack of social
engineering attacks where someone pretend to be an authority figure or someone your trust to gain access to
your login information. A robust and novel approach is needed to detect social engineering attacks and to send
alert to the user while sharing confidential information to the unauthorized target. We proposed an approach
which uses a dynamic Topic Blacklist (TBL) to verify the discussion topics of each line of text generated by the
potential attacker. Using Natural language processing and machine learning, system can automatically detect
social engineering attacks. Our approach is applicable to any attack vector since it depends only on the dialog
text. System can recognize shortcut as well as incorrect grammar.
Keywords: Social Engineering, Security,Data Security.
I. Introduction
Social engineering is a art of manipulating people so, they give up confidential information. Social
engineering (SE) has been largely misunderstood, leading to many differing opinions on what social engineering
is and how it works [1]. The Psychosomatic manipulation of people in order to get access to a system for which
the attacker is not authorized. Cyber attacker attack the weakest part of security system. Social engineering is a
modern form of the confidence scam which is grifter has always performed. Phishing emails are common
version of attack, which is request for private information, but social engineering come in many form design to
exploiting psychosomatic weakness of the target.
Social Engineering remains a popular method of compromising the security of computing systems.
According to Thornburgh (2004) social engineering has gained profound acceptance in the information
technology community as an effective social and psychological tool for exploiting the IT security mechanism of
a target organization. The primary aim of the research was to assess the threat that social engineering
vulnerabilities pose to IT systems and to raise staff awareness of the threat.[2]
Numerous experimental studies over the years have demon strated the susceptibility of people to social
engineering attacks [3], [4]. The effectiveness of social engineering has encouraged attackers to use it more
frequently, relying on social engineering as a component of larger attacks. A study by Verizon of security
breaches in 2013 has shown that 29% of all security breaches involve social engineering to extract information
for use primarily for phishing, bribery, and extortion [5].
Social engineering attacks is a communication between attacker and victim in order to obtain the some
confidential information. Information gathered might include secure information such as mobile number,
password, credit number which can support for larger attack. An attacker also convinces the victim to perform
task which would support an attack, Such as going to a websites.
This attack firstly executed via email but also in person via phone, SMS and other documents. The
efficiency of social engineering makes it a serious safety issue which must be addressed. Phishing emails are a
class of social engineering attack which are simple, attempting to establish trust in a single communication to a
victim. Phishing email attack is a simple but not effective as dialog based attack because gaining trust often
required a two-way communication with a victim. Previous work in the automatic detection of social
engineering attacks is limited to emails and websites, and do not attempt to detect the more subtle class of social
engineering attacks which are purely dialog-based. Other previous work has focused on the training of
individuals about social engineering attacks in order to make them more aware and resistant in the future.
Automatic Detection of Social Engineering Attacks Using Dialog
DOI: 10.9790/0661-17657678 www.iosrjournals.org 77 | Page
II. Topic Blacklist
Fig 1: Topic BlackList
TBL is one of the most important part in this topic. Initially Topic Blacklist (TBL) which describes all
forbidden topics of conversation with the victim having all possible topics which are entered manually as an
input. Further a new topics get added automatically into TBL and then it will be derived as a dynamic which
based on a basic understanding common security requirements, or an existing security policy document
associated with a system. All US federal agencies are required to provide information security by the "Federal
Information Security Act of 2002" [7], and policy documentation is part of that requirement [8]. Although
private industry is not required to provide such documentation, the significant cost associated with cyber attacks
has led many companies to document their security policies as well.
III. Proposed System
Fig2. Proposed System
We present an approach to the detection of social engineering attacks by performing semantic analysis
of all text transmitted to the victim to guess at the topics being discussed on each line. Each topic is then
checked for its appropriateness. A statement is considered to be inappropriate if it either requests secure
information or requests the performance of a secure operation. An ability to evaluate the appropriateness of a
question or command depends on the existence of a Topic Blacklist (TBL).[1] If there is an attack is detected,
then warning message will be generated as a alert to the victim.
IV. Algorithm
In this paper we are using two algorithm for detecting the attack as following:
1.Social Engineering Detection Algorithm.
2.Match Topic Algorithm.
I) Detection Algorithm:
The top-level algorithm for scanning the dialog to identify attacks is shown in Figure. The outer loop
scans through each line I in the text spoken by the attacker, TEXT. The inner loop iterates through each entry n
in the TBL. Line 3 invokes the Match Topic function to determine if the topic of entry n is contained in line I.If
the topic is found then the attack is detected and a warning message is display.
1. For each l Є TEXT.
2. For each n Є TBL.
3. If Match Topic (l,n).
4. ATTACK_DETECTED.
Automatic Detection of Social Engineering Attacks Using Dialog
DOI: 10.9790/0661-17657678 www.iosrjournals.org 78 | Page
II) Match Topic Algorithm:
The algorithm for the Match Topic function is shown in Figure. The purpose of the outer loop (line 1)
is to scan through each token in the line and compare it to n.action ,the action associated with TBL entry n. The
comparison to n.action is performed on line 2. If the action is found then the inner loop is entered (line 3) to
scan through the remaining tokens on the line and compare them to n.resource, the resource associated with t. If
both the action and resource are found then the function returns TRUE on line 5. The Compare function called
on lines 2 and 4 performs a string comparison, but it also compares the first argument to any synonyms of the
second argument.[1]
1. For i = 0 to | token in l |
2. If Compare (l[i], n.action).
3. For j = I + 1 to |token in l|.
4. If Compare (l[j], n.resource).
5. Return TRUE.
6. Return FALSE.
Table 1 shows the TBL which we use. The TBL was dynamically generated based on our
understanding of common generic social engineering attack goals. Each root word in the TBL is associated with
a set of synonyms which are considered to be equivalent. The synonyms for each root word which are
considered by our tool are not shown.
ACTION RESOURCE
Send Money
Send Sensitive Data
Call Number
Visit Website
Table1. Topic Blacklist (TBL)
V. Future Scope
In the future we plan to identify more social engineering attack transcripts which we can use to identify
weaknesses in our detection approach. The examples which we use here are all examples of relatively generic
attacks which could be broadly applied to most people. We will identify targeted social engineering attacks
which are designed for specific people or institutions. Detection of targeted attacks will present challenges in
defining the topic blacklist to protect institution-specific assets.
VI. Conclusion
We present an approach to detect social engineering attacks by verifying conversation, topics against a
topic blacklist. The approach is robust enough to effectively analyze the language of real attacks, including the
incorrect English which is often used in casual conversation.
The performance of our tool is good enough to provide attack warnings in real time during a
conversation to prevent the victim from violating security protocol.
References
[1]. Ram Bhakta and Ian G. Harris “Semantic Analysis of Dialogs to Detect Social Engineering Attacks” University of California
Irvine, USA 2015
[2]. C. Hadnagy and P. Wilson, “Social Engineering: The Art of Human Hacking”. Wiley, 2010.
[3]. T. Bakhshi, M. Papadaki, and S. Furnell, "A practical assessment of social engineering vulnerabilities." in Human Aspects of
Information Security and Assurance (HAISA), 200S.
[4]. A. Karakasilitiosis, S. M. Furnell, and M. Papadaki, "Assessing end-user awareness of social engineering and phishing." in
Australian information WGI!are and Security Conference, 2006.
[5]. 2013 Data Breach Investigations Report. Verizon, 2013.[Online].Available:http://books.google.com/booksd=YXiOnQEACAAJ
[6]. "Federal information security management act of 2002," 2002, title III of the E-Government Act of 2002 (Public Law 107-347).
[7]. "Minimum security requirements for federal information and information systems." National Institute of Standards, Tech. Rep.,
March 2006,j]PS Pub 200.

More Related Content

What's hot

Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerPutra Wanda
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerTELKOMNIKA JOURNAL
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Pvrtechnologies Nellore
 
New design of lightweight authentication protocol in wearable technology
New design of lightweight authentication protocol in wearable technologyNew design of lightweight authentication protocol in wearable technology
New design of lightweight authentication protocol in wearable technologyTELKOMNIKA JOURNAL
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
 
Evidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android DeviceEvidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android DeviceIJCSIS Research Publications
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsAM Publications,India
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksAM Publications,India
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introductionVasuki Ramasamy
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsKavita Rastogi
 
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSPRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultationijtsrd
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
 
Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...IJCSIS Research Publications
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A SurveyIJCSES Journal
 
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
 

What's hot (20)

Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...
 
New design of lightweight authentication protocol in wearable technology
New design of lightweight authentication protocol in wearable technologyNew design of lightweight authentication protocol in wearable technology
New design of lightweight authentication protocol in wearable technology
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
Evidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android DeviceEvidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android Device
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSPRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultation
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 
Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A Survey
 
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
 

Viewers also liked

Phytochemical and Antimicrobial Studies of Extracts from the Leaves of Tithon...
Phytochemical and Antimicrobial Studies of Extracts from the Leaves of Tithon...Phytochemical and Antimicrobial Studies of Extracts from the Leaves of Tithon...
Phytochemical and Antimicrobial Studies of Extracts from the Leaves of Tithon...IOSR Journals
 
Numerical Simulation on Mixed Convection Flow within Triangular Enclosures Ha...
Numerical Simulation on Mixed Convection Flow within Triangular Enclosures Ha...Numerical Simulation on Mixed Convection Flow within Triangular Enclosures Ha...
Numerical Simulation on Mixed Convection Flow within Triangular Enclosures Ha...IOSR Journals
 
Come vivere di traduzione editoriale
Come vivere di traduzione editorialeCome vivere di traduzione editoriale
Come vivere di traduzione editorialeCosi Repossi
 
Modeling the Effect of Variation of Recruitment Rate on the Transmission Dyna...
Modeling the Effect of Variation of Recruitment Rate on the Transmission Dyna...Modeling the Effect of Variation of Recruitment Rate on the Transmission Dyna...
Modeling the Effect of Variation of Recruitment Rate on the Transmission Dyna...IOSR Journals
 
IMPOR [ API ] - BARANG PERBAIKAN
IMPOR [ API ] - BARANG PERBAIKANIMPOR [ API ] - BARANG PERBAIKAN
IMPOR [ API ] - BARANG PERBAIKANlegalservice
 
DOKUMEN PERUSAHAAN DI BIDANG KEPABEANAN
DOKUMEN PERUSAHAAN DI BIDANG KEPABEANANDOKUMEN PERUSAHAAN DI BIDANG KEPABEANAN
DOKUMEN PERUSAHAAN DI BIDANG KEPABEANANlegalservice
 
DOKUMEN PERUSAHAAN DI BIDANG IMPORT :
DOKUMEN PERUSAHAAN DI BIDANG IMPORT :DOKUMEN PERUSAHAAN DI BIDANG IMPORT :
DOKUMEN PERUSAHAAN DI BIDANG IMPORT :legalservice
 
Weekend Warriors Connecting Buffalo
Weekend Warriors Connecting BuffaloWeekend Warriors Connecting Buffalo
Weekend Warriors Connecting BuffaloRich Frank
 
Discharge and Sediment Transport Modeling Buck Creek Proposal
Discharge and Sediment Transport Modeling Buck Creek ProposalDischarge and Sediment Transport Modeling Buck Creek Proposal
Discharge and Sediment Transport Modeling Buck Creek ProposalJames Blumenschein
 

Viewers also liked (16)

H0743842
H0743842H0743842
H0743842
 
Phytochemical and Antimicrobial Studies of Extracts from the Leaves of Tithon...
Phytochemical and Antimicrobial Studies of Extracts from the Leaves of Tithon...Phytochemical and Antimicrobial Studies of Extracts from the Leaves of Tithon...
Phytochemical and Antimicrobial Studies of Extracts from the Leaves of Tithon...
 
Numerical Simulation on Mixed Convection Flow within Triangular Enclosures Ha...
Numerical Simulation on Mixed Convection Flow within Triangular Enclosures Ha...Numerical Simulation on Mixed Convection Flow within Triangular Enclosures Ha...
Numerical Simulation on Mixed Convection Flow within Triangular Enclosures Ha...
 
Come vivere di traduzione editoriale
Come vivere di traduzione editorialeCome vivere di traduzione editoriale
Come vivere di traduzione editoriale
 
Modeling the Effect of Variation of Recruitment Rate on the Transmission Dyna...
Modeling the Effect of Variation of Recruitment Rate on the Transmission Dyna...Modeling the Effect of Variation of Recruitment Rate on the Transmission Dyna...
Modeling the Effect of Variation of Recruitment Rate on the Transmission Dyna...
 
IMPOR [ API ] - BARANG PERBAIKAN
IMPOR [ API ] - BARANG PERBAIKANIMPOR [ API ] - BARANG PERBAIKAN
IMPOR [ API ] - BARANG PERBAIKAN
 
DOKUMEN PERUSAHAAN DI BIDANG KEPABEANAN
DOKUMEN PERUSAHAAN DI BIDANG KEPABEANANDOKUMEN PERUSAHAAN DI BIDANG KEPABEANAN
DOKUMEN PERUSAHAAN DI BIDANG KEPABEANAN
 
PE INTAN KASAR
PE INTAN KASARPE INTAN KASAR
PE INTAN KASAR
 
NPIK ELEKTRONIKA
NPIK ELEKTRONIKANPIK ELEKTRONIKA
NPIK ELEKTRONIKA
 
DOKUMEN PERUSAHAAN DI BIDANG IMPORT :
DOKUMEN PERUSAHAAN DI BIDANG IMPORT :DOKUMEN PERUSAHAAN DI BIDANG IMPORT :
DOKUMEN PERUSAHAAN DI BIDANG IMPORT :
 
D0731218
D0731218D0731218
D0731218
 
Cell Division
Cell DivisionCell Division
Cell Division
 
Weekend Warriors Connecting Buffalo
Weekend Warriors Connecting BuffaloWeekend Warriors Connecting Buffalo
Weekend Warriors Connecting Buffalo
 
J010137377
J010137377J010137377
J010137377
 
N0175496100
N0175496100N0175496100
N0175496100
 
Discharge and Sediment Transport Modeling Buck Creek Proposal
Discharge and Sediment Transport Modeling Buck Creek ProposalDischarge and Sediment Transport Modeling Buck Creek Proposal
Discharge and Sediment Transport Modeling Buck Creek Proposal
 

Similar to M017657678

Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT WorldAkshay Mittal
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismIJECEIAES
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011Felipe Prado
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGDrm Kapoor
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data MiningCollusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Miningdbpublications
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security AwarenessDigit Oktavianto
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxjeffreye3
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos Isaris
 

Similar to M017657678 (20)

Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT World
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data MiningCollusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

M017657678

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. V (Nov – Dec. 2015), PP 76-78 www.iosrjournals.org DOI: 10.9790/0661-17657678 www.iosrjournals.org 76 | Page Automatic Detection of Social Engineering Attacks Using Dialog Pooja kale, Shital Kashiwant, Nisha Kamble, Subodh Awate Prof. Sonali Tidke Department of Computer Engineering Pimpri Chinchwad College of Engineering, Nigdi, pune. Abstract: Cyber attacker target the weakest part of security system which is increasingly the people who use and interact with a computer-based system is the easiest way for cyber attacker to attack the user. A separate research area is provided in order to protect computer assets. But by exploiting human vulnerabilities, an attacker can find a way for many computer-based defences. Phishing is the most common attack of social engineering attacks where someone pretend to be an authority figure or someone your trust to gain access to your login information. A robust and novel approach is needed to detect social engineering attacks and to send alert to the user while sharing confidential information to the unauthorized target. We proposed an approach which uses a dynamic Topic Blacklist (TBL) to verify the discussion topics of each line of text generated by the potential attacker. Using Natural language processing and machine learning, system can automatically detect social engineering attacks. Our approach is applicable to any attack vector since it depends only on the dialog text. System can recognize shortcut as well as incorrect grammar. Keywords: Social Engineering, Security,Data Security. I. Introduction Social engineering is a art of manipulating people so, they give up confidential information. Social engineering (SE) has been largely misunderstood, leading to many differing opinions on what social engineering is and how it works [1]. The Psychosomatic manipulation of people in order to get access to a system for which the attacker is not authorized. Cyber attacker attack the weakest part of security system. Social engineering is a modern form of the confidence scam which is grifter has always performed. Phishing emails are common version of attack, which is request for private information, but social engineering come in many form design to exploiting psychosomatic weakness of the target. Social Engineering remains a popular method of compromising the security of computing systems. According to Thornburgh (2004) social engineering has gained profound acceptance in the information technology community as an effective social and psychological tool for exploiting the IT security mechanism of a target organization. The primary aim of the research was to assess the threat that social engineering vulnerabilities pose to IT systems and to raise staff awareness of the threat.[2] Numerous experimental studies over the years have demon strated the susceptibility of people to social engineering attacks [3], [4]. The effectiveness of social engineering has encouraged attackers to use it more frequently, relying on social engineering as a component of larger attacks. A study by Verizon of security breaches in 2013 has shown that 29% of all security breaches involve social engineering to extract information for use primarily for phishing, bribery, and extortion [5]. Social engineering attacks is a communication between attacker and victim in order to obtain the some confidential information. Information gathered might include secure information such as mobile number, password, credit number which can support for larger attack. An attacker also convinces the victim to perform task which would support an attack, Such as going to a websites. This attack firstly executed via email but also in person via phone, SMS and other documents. The efficiency of social engineering makes it a serious safety issue which must be addressed. Phishing emails are a class of social engineering attack which are simple, attempting to establish trust in a single communication to a victim. Phishing email attack is a simple but not effective as dialog based attack because gaining trust often required a two-way communication with a victim. Previous work in the automatic detection of social engineering attacks is limited to emails and websites, and do not attempt to detect the more subtle class of social engineering attacks which are purely dialog-based. Other previous work has focused on the training of individuals about social engineering attacks in order to make them more aware and resistant in the future.
  • 2. Automatic Detection of Social Engineering Attacks Using Dialog DOI: 10.9790/0661-17657678 www.iosrjournals.org 77 | Page II. Topic Blacklist Fig 1: Topic BlackList TBL is one of the most important part in this topic. Initially Topic Blacklist (TBL) which describes all forbidden topics of conversation with the victim having all possible topics which are entered manually as an input. Further a new topics get added automatically into TBL and then it will be derived as a dynamic which based on a basic understanding common security requirements, or an existing security policy document associated with a system. All US federal agencies are required to provide information security by the "Federal Information Security Act of 2002" [7], and policy documentation is part of that requirement [8]. Although private industry is not required to provide such documentation, the significant cost associated with cyber attacks has led many companies to document their security policies as well. III. Proposed System Fig2. Proposed System We present an approach to the detection of social engineering attacks by performing semantic analysis of all text transmitted to the victim to guess at the topics being discussed on each line. Each topic is then checked for its appropriateness. A statement is considered to be inappropriate if it either requests secure information or requests the performance of a secure operation. An ability to evaluate the appropriateness of a question or command depends on the existence of a Topic Blacklist (TBL).[1] If there is an attack is detected, then warning message will be generated as a alert to the victim. IV. Algorithm In this paper we are using two algorithm for detecting the attack as following: 1.Social Engineering Detection Algorithm. 2.Match Topic Algorithm. I) Detection Algorithm: The top-level algorithm for scanning the dialog to identify attacks is shown in Figure. The outer loop scans through each line I in the text spoken by the attacker, TEXT. The inner loop iterates through each entry n in the TBL. Line 3 invokes the Match Topic function to determine if the topic of entry n is contained in line I.If the topic is found then the attack is detected and a warning message is display. 1. For each l Є TEXT. 2. For each n Є TBL. 3. If Match Topic (l,n). 4. ATTACK_DETECTED.
  • 3. Automatic Detection of Social Engineering Attacks Using Dialog DOI: 10.9790/0661-17657678 www.iosrjournals.org 78 | Page II) Match Topic Algorithm: The algorithm for the Match Topic function is shown in Figure. The purpose of the outer loop (line 1) is to scan through each token in the line and compare it to n.action ,the action associated with TBL entry n. The comparison to n.action is performed on line 2. If the action is found then the inner loop is entered (line 3) to scan through the remaining tokens on the line and compare them to n.resource, the resource associated with t. If both the action and resource are found then the function returns TRUE on line 5. The Compare function called on lines 2 and 4 performs a string comparison, but it also compares the first argument to any synonyms of the second argument.[1] 1. For i = 0 to | token in l | 2. If Compare (l[i], n.action). 3. For j = I + 1 to |token in l|. 4. If Compare (l[j], n.resource). 5. Return TRUE. 6. Return FALSE. Table 1 shows the TBL which we use. The TBL was dynamically generated based on our understanding of common generic social engineering attack goals. Each root word in the TBL is associated with a set of synonyms which are considered to be equivalent. The synonyms for each root word which are considered by our tool are not shown. ACTION RESOURCE Send Money Send Sensitive Data Call Number Visit Website Table1. Topic Blacklist (TBL) V. Future Scope In the future we plan to identify more social engineering attack transcripts which we can use to identify weaknesses in our detection approach. The examples which we use here are all examples of relatively generic attacks which could be broadly applied to most people. We will identify targeted social engineering attacks which are designed for specific people or institutions. Detection of targeted attacks will present challenges in defining the topic blacklist to protect institution-specific assets. VI. Conclusion We present an approach to detect social engineering attacks by verifying conversation, topics against a topic blacklist. The approach is robust enough to effectively analyze the language of real attacks, including the incorrect English which is often used in casual conversation. The performance of our tool is good enough to provide attack warnings in real time during a conversation to prevent the victim from violating security protocol. References [1]. Ram Bhakta and Ian G. Harris “Semantic Analysis of Dialogs to Detect Social Engineering Attacks” University of California Irvine, USA 2015 [2]. C. Hadnagy and P. Wilson, “Social Engineering: The Art of Human Hacking”. Wiley, 2010. [3]. T. Bakhshi, M. Papadaki, and S. Furnell, "A practical assessment of social engineering vulnerabilities." in Human Aspects of Information Security and Assurance (HAISA), 200S. [4]. A. Karakasilitiosis, S. M. Furnell, and M. Papadaki, "Assessing end-user awareness of social engineering and phishing." in Australian information WGI!are and Security Conference, 2006. [5]. 2013 Data Breach Investigations Report. Verizon, 2013.[Online].Available:http://books.google.com/booksd=YXiOnQEACAAJ [6]. "Federal information security management act of 2002," 2002, title III of the E-Government Act of 2002 (Public Law 107-347). [7]. "Minimum security requirements for federal information and information systems." National Institute of Standards, Tech. Rep., March 2006,j]PS Pub 200.