Abstract
In current times, malefactors chances to succeed in performing a social engineering attack on company usually depends on how much personal information about employees he owns. Thus, search and analysis of public information about company’s employees from social network websites with purpose of protection company from malicious actions is important issue. This article is devoted to methods of identifying user’s online footprint in website of social network VK.com. Prototype of the tool for identifying employees public pages using binary decision trees as classifier is presented. Approach to fully automated gathering of training dataset is described.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abramov, M.V., Azarov, A.A.: Social engineering attack modeling with the use of Bayesian networks. In: 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), pp. 58–60. IEEE (2016)
Abramov, M.V., Azarov, A.A., Tulupyeva, T.V., Tulupyev, A.L.: Model of malefactor profile for analyzing information system personnel security from social engineering attacks. Inf. Control Syst. 4, 77–84 (2016)
Azarov, A.A., Tulupyeva, T.V., Suvorova, A.V., Tulupyev, A.L., Abramov, M.V., Usypov, R.M.: Social engineering attacks: problem of analisys. Science (2016). SPb
Cost of Cyber Crime Study: United States, Ponemon Institute, p. 30, October 2012. http://www.ponemon.org/local/upload/file/2012_US_Cost_of_Cyber_Crime_Study_FINAL6%20.pdf
Cost of Cyber Crime Study: United States, Ponemon Institute, p. 30, October 2013. https://media.scmagazine.com/documents/54/2013_us_ccc_report_final_6-1_13455.pdf
Cost of Cyber Crime Study: United States, Ponemon Institute, p. 30, October 2014. http://resources.idgenterprise.com/original/AST-0130677_2014_US_Cost_of_Cyber_Crime_Study_FINAL_2.pdf
Cost of Cyber Crime Study: Global, Ponemon Institute, p. 30, October 2015. https://ssl.www8.hp.com/us/en/ssl/leadgen/
Edwards, M., Larson, R., Green, B., Rashid, A., Baron, A.: Panning for gold: Automatically analyzing online social engineering attack surfaces. http://dx.doi.org/10.1016/j.cose.2016.12.013
Information security business. Studies of current trends in information security business. Kaspersky Lab. http://media.kaspersky.com/pdf/IT_risk_report_Russia_2014.pdf. Accessed 30 Apr 2015
Kaspersky lab: Business information security, p. 11 (2014). http://media.kaspersky.com/pdf/IT_risk_report_Russia_2014.pdf
Kotenko, I.V., Stepashkin, M.V.: Systems-simulators: purpose, functions, architecture and implementation approach. Math. Univ. Instrum. 49(3), 3–8 (2006)
Kotenko, I.V., Yusupov, R.M.: Future research directions in the field of computer security. Data Protection. Inside. No. 2, p. 46 (2006)
Messing, P., Schram, J., Golding, B.: Teen says he hacked CIA director’s AOL account, New York post, 18 October 2015. http://nypost.com/2015/10/18/stoner-high-school-student-says-he-hacked-the-cia/. Accessed 12 Apr 2015
Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley, Indianapolis (2011)
Second Annual Cost of Cyber Crime Study. Ponemon Institute, p. 30, August 2011. http://www.ponemon.org/local/upload/file/2011_2nd_Annual_Cost_of_Cyber_Crime_Study%20.pdf
Social networks in Russia, Autumn 2016. Numbers, trends, forecasts. https://adindex.ru/publication/analitics/100380/2016/12/8/156545.phtml. Accessed 13 Apr 2017
Social networks in Russia, Winter 2015–2016. Numbers, trends, forecasts. https://blog.br-analytics.ru/socialnye-seti-v-rossii-zima-2015-2016-cifry-trendy-prognozy/. Accessed 13 Apr 2017
The losses from cybercrime continue to grow. http://www8.hp.com/ru/ru/software-solutions/ponemon-cyber-security-report/index.html. Accessed 12 Apr 2017
The path to cyberstability: forecast, protection, response (2016). http://www.ey.com/Publication/vwLUAssets/EY-giss-2016-rus/$File/EY-giss-2016-rus.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Shindarev, N., Bagretsov, G., Abramov, M., Tulupyeva, T., Suvorova, A. (2018). Approach to Identifying of Employees Profiles in Websites of Social Networks Aimed to Analyze Social Engineering Vulnerabilities. In: Abraham, A., Kovalev, S., Tarassov, V., Snasel, V., Vasileva, M., Sukhanov, A. (eds) Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17). IITI 2017. Advances in Intelligent Systems and Computing, vol 679. Springer, Cham. https://doi.org/10.1007/978-3-319-68321-8_45
Download citation
DOI: https://doi.org/10.1007/978-3-319-68321-8_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68320-1
Online ISBN: 978-3-319-68321-8
eBook Packages: EngineeringEngineering (R0)