Skip to main content

Randomized General Indices for Evaluating Damage Through Malefactor Social Engineering Attacks

  • Conference paper
  • First Online:
  • 773 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1093))

Abstract

The paper is devoted to the application of the method of randomized general indices in assessing potential damage to a company if confidential information is leaked due to malefactor’s social engineering attack. This assessment is used in a comparative analysis of the effectiveness of various measures aimed at increasing the level of user protection from the malefactor’s social engineering attacks.

The results were partially supported by RFBR, project No. 18-37-00340, and Governmental contract (SPIIRAS) No. 0073-2019-0003.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Azarov, A., Abramov, M., Tulupyev, A., Tulupyeva, T.: Models and algorithms for the information system’s users’ protection level probabilistic estimation. In: Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI 2016), vol. 2, pp. 39–46 (2016)

    Google Scholar 

  2. Azarov, A., Abramov, M., Tulupyeva, T., Tulupyev, A.: Users’ of Information System Protection Analysis from Malefactor’s Social Engineering Attacks Taking into Account Malefactor’s Competence Profile. Biologically Inspired Cognitive Architectures (BICA) for Young Scientists, pp. 25–30 (2016)

    Google Scholar 

  3. Azarov, A., Suvorova, A., Tulupyeva, T.: Changing the information system’s protection level from social engineering attacks, in case of reorganizing the information system’s users’ structure. In: II International Scientific-Practical Conference “Fuzzy Technologies in the Industry”, pp. 56–62 (2018)

    Google Scholar 

  4. Azarov, A., Suvorova, A.: Sustainability of the user’s social network graph to the social engineering attack actions: an approach based on genetic algorithms. In: XXII International Conference on Soft Computing and Measurement (SCM 2018), pp. 126–129 (2018)

    Google Scholar 

  5. Chereshkin, D.: Problemy obespecheniya informacionnoj bezopasnosti v novyh usloviyah. Informatizaciya i svyaz’, № 3, pp. 99–106 (2014)

    Google Scholar 

  6. Gupta, B., Tewari, A., Jain, A., Agrawal, D.: Fighting against phishing attacks: state of the art and future challenges. Neural Comput. Appl. 28, 3629–3654 (2017)

    Article  Google Scholar 

  7. Hovanov, N., Kornikov, V., Seregin, I.: Qualitative information processing in DSS ASPID-3W for complex objects estimation under uncertainty. In: Proceedings of the International Conference “Informatics and Control”, pp. 808–816 (1997)

    Google Scholar 

  8. Hovanov, N., Kornikov, V., Seregin, I.: Randomized synthesis of fuzzy sets as a technique for multicriteria decision making under uncertainty. In: Proceedings of the International Conference “Fuzzy Logic and Applications”, pp. 281–288 (1997)

    Google Scholar 

  9. Hovanov, N., Kornikov, V., Tokin, I.: A mathematical methods system of decision making for developmental strategy under uncertainty. In: Global Environmental Change. Perspective of Remote Sensing and Geographic Information Systems, pp. 93–96 (1995)

    Google Scholar 

  10. Hovanov, N., Kolari, J.: Estimating the overall financial performance of Mexican banks using a new method for quantifying subjective information. J. Financ. Eng. 7(1), 59–77 (1998)

    Google Scholar 

  11. Hovanov, N., Fedotov, Yu., Zakharov, V.: The making of index numbers under uncertainty. In: Environmental Indices: Systems Analysis Approach, pp. 83–99 (1999)

    Google Scholar 

  12. Hovanov, N.: Evaluation of complex objects in the context of lack of information. In: Proceedings of the 7th International Scientific School “Modeling and Analysis of Safety and Risk in Complex Systems”, pp. 18–28 (2008)

    Google Scholar 

  13. Kharitonov, N., Maximov, A., Tulupyev, A.: Algebraic Bayesian networks: the use of parallel computing while maintaining various degrees of consistency. Stud. Syst. Decis. Control 199, 696–704 (2019)

    Article  Google Scholar 

  14. Kotenko, I., Chechulin, A., Branitskiy, A.: Generation of source data for experiments with network attack detection software. J. Phys. Conf. Ser. 820, 12–33 (2017)

    Article  Google Scholar 

  15. Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., Kusev, P.: Risk perceptions of cyber-security and precautionary behavior. Comput. Hum. Behav. 62, 5678–5693 (2017)

    Google Scholar 

  16. Shindarev, N., Bagretsov, G., Abramov, M., Tulupyeva, T., Suvorova, A.: Approach to identifying of employees profiles in websites of social networks aimed to analyze social engineering vulnerabilities. In: International Conference on Intelligent Information Technologies for Industry, pp. 441–447 (2017)

    Google Scholar 

  17. Struharik, R., Vukobratović, B.: A system for hardware aided decision tree ensemble evolution. J. Parallel Distrib. Comput. 112, 67–83 (2018)

    Article  Google Scholar 

  18. Suleimanov, A., Abramov, M., Tulupyev, A.: Modelling of the social engineering attacks based on social graph of employees communications analysis. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS), pp. 801–805 (2018)

    Google Scholar 

  19. Tarasov, V.: On granular structures of measurement in ambient intelligence systems: Vassiliev’s and Belnap’s sensors and their communication models. Inf. Meas. Control Syst. 5, 65–74 (2013)

    Google Scholar 

  20. Terlizzi, M., Meirelles, F., Viegas Cortez da Cunha, M.: Behavior of Brazilian banks employees on Facebook and the cybersecurity governance. J. Appl. Secur. Res. 12, 224–252 (2017)

    Article  Google Scholar 

  21. Tulupyev, A., Kharitonov, N., Zolotin, A.: Algebraic Bayesian networks: consistent fusion of partially intersected knowledge systems. In: The Second International Scientific and Practical Conference “Fuzzy Technologies in the Industry – FTI 2018”, pp. 109–115 (2018)

    Google Scholar 

  22. Vasileva, O., Kiyaev, V.: Monitoring and controlling the execution of the sea cargo port operation’s schedule based on multi-agent technologies. In: CEUR Workshop Proceedings of the 2nd International Scientific and Practical Conference “Fuzzy Technologies in the Industry – FTI”, vol. 2258, pp. 243–248 (2018)

    Google Scholar 

  23. Zadeh, L.: Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic. Fuzzy Sets Syst. 90(2), 111–127 (1997)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artur Azarov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Azarov, A., Vasileva, O., Tulupyeva, T. (2019). Randomized General Indices for Evaluating Damage Through Malefactor Social Engineering Attacks. In: Kuznetsov, S., Panov, A. (eds) Artificial Intelligence. RCAI 2019. Communications in Computer and Information Science, vol 1093. Springer, Cham. https://doi.org/10.1007/978-3-030-30763-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30763-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30762-2

  • Online ISBN: 978-3-030-30763-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics