A Risk Analysis Framework for Social Engineering Attack Based on User Profiling

A Risk Analysis Framework for Social Engineering Attack Based on User Profiling

Ziwei Ye, Yuanbo Guo, Ankang Ju, Fushan Wei, Ruijie Zhang, Jun Ma
Copyright: © 2020 |Pages: 13
DOI: 10.4018/JOEUC.2020070104
Article PDF Download
Open access articles are freely available for download

Abstract

Social engineering attacks are becoming serious threats to cloud service. Social engineering attackers could get Cloud service custom privacy information or attack virtual machine images directly. Existing security analysis instruments are difficult to quantify the social engineering attack risk, resulting in invalid defense guidance for social engineering attacks. In this article, a risk analysis framework for social engineering attack is proposed based on user profiling. The framework provides a pathway to quantitatively calculate the possibility of being compromised by social engineering attack and potential loss, so as to effectively complement current security assessment instruments. The frequency of related operations is used to profile and group users for respective risk calculation, and other features such as security awareness and capability of protection mechanism are also considered. Finally, examples are given to illustrate how to use the framework in actual scenario and apply it to security assessment.
Article Preview
Top

Introduction

With the development of cloud security, social engineering attacks have been paid more and more attention because of the outstanding capability of penetrating cloud service which is difficult to the conventional techniques. However, the awareness for social engineering of cloud service customs and providers is relatively low (Krombholz et al., 2015; Kuyoro et al., 2011). Improving awareness and ability of prevention to social engineering attacks is of great significance for the accuracy of cloud security assessment and anti-attack capability.

Current researches on social engineering attacks are mainly of classification and qualitative analysis based on known cases. Chandra et al., (2015) treats social engineering attack as a feature of APT and discuss how to deploy defense system in cloud. A case is given to show how to run a malicious virtual machine in Amazon EC2 by social engineering (Meer et al., 2009). Some researchers summed up the existing social engineering attack classification achievements (Fooxy et al., 2011) and frequently used social engineering malwares (Abraham & Chengalur-Smith, 2010). In Mouton et al. (2014) the writers extracted a social engineering attack framework based on Kevin Mitnick's book “The art of deception: Controlling the human element of security” (Mitnick & Simon, 2001). A multi-layered model was presented for assessing possible social engineering exploits (Jaafor & Birregah, 2016). How educational and technological means can be used to reduce social engineering risk which the social media users faced was discussed (Tayouri 2015). Sheng et al. (2010) used a roleplay survey instrument to assess user’s vulnerability of phishing. However, there is little quantitative evaluation of possibility of being compromised by social engineer attacker and potential loss expect (Sheng et al., 2010), so that it is impossible to compare risks between social engineering attacks and technical attacks without social factors. Social engineering attack risk couldn’t be taken into account in network security assessment, resulting in negative effects on network reinforcement.

User profiling is an important application of big data. By adding descriptive tags to users, it can depict users from multiple dimensions, and reflect users’ behaviors, hobbies, jobs, etc. In recent years, user profiling has been widely used in network security research. An automated insider threat detection system was realized user profiling (Legg et al., 2017). Nurse et al. (2016) the writers studied how to distinguish online identify falsification. A framework was proposed to analyze users’ attributes and recognize accounts which belong to the same user from different social networks (Monika et al., 2016). As social engineering attack is the exploitation of human weaknesses, and the object of user profiling is also human, user model can be built by user profiling to find possible social engineering attack surface. It will be more pertinence comparing with techniques whose objects are networks or computers.

Aiming at the problem that existing network security assessment techniques cannot quantify the risk of social engineering attack, the authors present a risk analysis framework for social engineering attack based on user profiling. By extracting the relevant features, the possibility of being compromised and potential loss caused by social engineering attack could be quantified. The framework can be applied to various network security assessment instruments to optimize results and guide the employment of protection mechanisms against social engineering attack.

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing