Skip to main content

Approach to Identifying of Employees Profiles in Websites of Social Networks Aimed to Analyze Social Engineering Vulnerabilities

  • Conference paper
  • First Online:
Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17) (IITI 2017)

Abstract

In current times, malefactors chances to succeed in performing a social engineering attack on company usually depends on how much personal information about employees he owns. Thus, search and analysis of public information about company’s employees from social network websites with purpose of protection company from malicious actions is important issue. This article is devoted to methods of identifying user’s online footprint in website of social network VK.com. Prototype of the tool for identifying employees public pages using binary decision trees as classifier is presented. Approach to fully automated gathering of training dataset is described.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abramov, M.V., Azarov, A.A.: Social engineering attack modeling with the use of Bayesian networks. In: 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), pp. 58–60. IEEE (2016)

    Google Scholar 

  2. Abramov, M.V., Azarov, A.A., Tulupyeva, T.V., Tulupyev, A.L.: Model of malefactor profile for analyzing information system personnel security from social engineering attacks. Inf. Control Syst. 4, 77–84 (2016)

    Google Scholar 

  3. Azarov, A.A., Tulupyeva, T.V., Suvorova, A.V., Tulupyev, A.L., Abramov, M.V., Usypov, R.M.: Social engineering attacks: problem of analisys. Science (2016). SPb

    Google Scholar 

  4. Cost of Cyber Crime Study: United States, Ponemon Institute, p. 30, October 2012. http://www.ponemon.org/local/upload/file/2012_US_Cost_of_Cyber_Crime_Study_FINAL6%20.pdf

  5. Cost of Cyber Crime Study: United States, Ponemon Institute, p. 30, October 2013. https://media.scmagazine.com/documents/54/2013_us_ccc_report_final_6-1_13455.pdf

  6. Cost of Cyber Crime Study: United States, Ponemon Institute, p. 30, October 2014. http://resources.idgenterprise.com/original/AST-0130677_2014_US_Cost_of_Cyber_Crime_Study_FINAL_2.pdf

  7. Cost of Cyber Crime Study: Global, Ponemon Institute, p. 30, October 2015. https://ssl.www8.hp.com/us/en/ssl/leadgen/

  8. Edwards, M., Larson, R., Green, B., Rashid, A., Baron, A.: Panning for gold: Automatically analyzing online social engineering attack surfaces. http://dx.doi.org/10.1016/j.cose.2016.12.013

  9. Information security business. Studies of current trends in information security business. Kaspersky Lab. http://media.kaspersky.com/pdf/IT_risk_report_Russia_2014.pdf. Accessed 30 Apr 2015

  10. Kaspersky lab: Business information security, p. 11 (2014). http://media.kaspersky.com/pdf/IT_risk_report_Russia_2014.pdf

  11. Kotenko, I.V., Stepashkin, M.V.: Systems-simulators: purpose, functions, architecture and implementation approach. Math. Univ. Instrum. 49(3), 3–8 (2006)

    Google Scholar 

  12. Kotenko, I.V., Yusupov, R.M.: Future research directions in the field of computer security. Data Protection. Inside. No. 2, p. 46 (2006)

    Google Scholar 

  13. Messing, P., Schram, J., Golding, B.: Teen says he hacked CIA director’s AOL account, New York post, 18 October 2015. http://nypost.com/2015/10/18/stoner-high-school-student-says-he-hacked-the-cia/. Accessed 12 Apr 2015

  14. Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley, Indianapolis (2011)

    Google Scholar 

  15. Second Annual Cost of Cyber Crime Study. Ponemon Institute, p. 30, August 2011. http://www.ponemon.org/local/upload/file/2011_2nd_Annual_Cost_of_Cyber_Crime_Study%20.pdf

  16. Social networks in Russia, Autumn 2016. Numbers, trends, forecasts. https://adindex.ru/publication/analitics/100380/2016/12/8/156545.phtml. Accessed 13 Apr 2017

  17. Social networks in Russia, Winter 2015–2016. Numbers, trends, forecasts. https://blog.br-analytics.ru/socialnye-seti-v-rossii-zima-2015-2016-cifry-trendy-prognozy/. Accessed 13 Apr 2017

  18. The losses from cybercrime continue to grow. http://www8.hp.com/ru/ru/software-solutions/ponemon-cyber-security-report/index.html. Accessed 12 Apr 2017

  19. The path to cyberstability: forecast, protection, response (2016). http://www.ey.com/Publication/vwLUAssets/EY-giss-2016-rus/$File/EY-giss-2016-rus.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikita Shindarev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Shindarev, N., Bagretsov, G., Abramov, M., Tulupyeva, T., Suvorova, A. (2018). Approach to Identifying of Employees Profiles in Websites of Social Networks Aimed to Analyze Social Engineering Vulnerabilities. In: Abraham, A., Kovalev, S., Tarassov, V., Snasel, V., Vasileva, M., Sukhanov, A. (eds) Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17). IITI 2017. Advances in Intelligent Systems and Computing, vol 679. Springer, Cham. https://doi.org/10.1007/978-3-319-68321-8_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68321-8_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68320-1

  • Online ISBN: 978-3-319-68321-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics