Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο: https://ruomo.lib.uom.gr/handle/7000/1490
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DCΤιμήΓλώσσα
dc.contributor.authorTsinganos, Nikolaos-
dc.contributor.authorSakellariou, Georgios-
dc.contributor.authorFouliras, Panagiotis-
dc.contributor.authorMavridis, Ioannis-
dc.date.accessioned2022-10-09T06:47:17Z-
dc.date.available2022-10-09T06:47:17Z-
dc.date.issued2018-08-
dc.identifier.urihttps://dl.acm.org/doi/10.1145/3230833.3233277en_US
dc.identifier.urihttps://ruomo.lib.uom.gr/handle/7000/1490-
dc.description.abstractIncrease in usage of electronic communication tools (email, IM, Skype, etc.) in enterprise environments has created new attack vectors for social engineers. Billions of people are now using electronic equipment in their everyday workflow which means billions of potential victims of Social Engineering (SE) attacks. Human is considered the weakest link in cybersecurity chain and breaking this defense is nowadays the most accessible route for malicious internal and external users. While several methods of protection have already been proposed and applied, none of these focuses on chat-based SE attacks while at the same time automation in the field is still missing. Social engineering is a complex phenomenon that requires interdisciplinary research combining technology, psychology, and linguistics. Attackers treat human personality traits as vulnerabilities and use the language as their weapon to deceive, persuade and finally manipulate the victims as they wish. Hence, a holistic approach is required to build a reliable SE attack recognition system. In this paper we present the current state-of-the-art on SE attack recognition systems, we dissect a SE attack to recognize the different stages, forms, and attributes and isolate the critical enablers that can influence a SE attack to work. Finally, we present our approach for an automated recognition system for chatbased SE attacks that is based on Personality Recognition, Influence Recognition, Deception Recognition, Speech Act and Chat History.en_US
dc.language.isoenen_US
dc.publisherACMen_US
dc.rightsCC0 1.0 Universal*
dc.rights.urihttp://creativecommons.org/publicdomain/zero/1.0/*
dc.subjectFRASCATI::Engineering and technology::Electrical engineering, Electronic engineering, Information engineeringen_US
dc.subject.otherSocial Engineeringen_US
dc.subject.otherPersonalityen_US
dc.subject.otherPersuasionen_US
dc.subject.otherDeceptionen_US
dc.subject.otherSpeech Acten_US
dc.titleTowards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environmentsen_US
dc.typeConference Paperen_US
dc.contributor.departmentΤμήμα Εφαρμοσμένης Πληροφορικήςen_US
local.identifier.volumetitleARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Securityen_US
Εμφανίζεται στις Συλλογές: Τμήμα Εφαρμοσμένης Πληροφορικής

Αρχεία σε αυτό το Τεκμήριο:
Αρχείο Περιγραφή ΜέγεθοςΜορφότυπος 
automated-recognition-chatv2.pdf824,95 kBAdobe PDFThumbnail
Προβολή/Ανοιγμα


Αυτό το τεκμήριο προστατεύεται από Αδεια Creative Commons Creative Commons