ResearchSpace

Social Engineering Attack Detection Model: SEADMv2

Show simple item record

dc.contributor.author Mouton, F
dc.contributor.author Leenen, L
dc.contributor.author Venter, HS
dc.date.accessioned 2016-08-22T11:33:37Z
dc.date.available 2016-08-22T11:33:37Z
dc.date.issued 2015-10
dc.identifier.citation Mouton, F. Leenen, L. and Venter, H.S. 2015. Social Engineering Attack Detection Model: SEADMv2. In: 2015 International Conference on Cyberworlds, Visby, Sweden, October 2015 en_US
dc.identifier.isbn 978-1-4673-9403-1
dc.identifier.uri http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7398418&tag=1
dc.identifier.uri http://hdl.handle.net/10204/8726
dc.description 2015 International Conference on Cyberworlds, Visby, Sweden, October 2015. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website en_US
dc.description.abstract Information security is a fast-growing discipline, and therefore the effectiveness of security measures to protect sensitive information needs to be increased. Since people are generally susceptible to manipulation, humans often prove to be the weak link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal definitions, attack frameworks, examples of attacks and detection models are concerned. This paper therefore proposes a revised version of the Social Engineering Attack Detection Model. The previous model was designed with a call centre environment in mind and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional communication, unidirectional communication or indirect communication. The proposed (and revised) Social Engineering Attack Detection Model addresses this problem by extending the model to cater for social engineering attacks that use bidirectional communication, unidirectional communication or indirect communication. The revised Social Engineering Attack Detection Model is further verified using published generalised social engineering attack examples from each of the three categories mentioned. en_US
dc.language.iso en en_US
dc.publisher IEEE Xplore en_US
dc.relation.ispartofseries Workflow;16308
dc.subject Bidirectional Communication en_US
dc.subject Indirect Communication en_US
dc.subject Social Engineering en_US
dc.subject Social Engineering Attack Examples en_US
dc.subject Social Engineering Attack Detection Model en_US
dc.subject Unidirectional Communication en_US
dc.title Social Engineering Attack Detection Model: SEADMv2 en_US
dc.type Article en_US
dc.identifier.apacitation Mouton, F., Leenen, L., & Venter, H. (2015). Social Engineering Attack Detection Model: SEADMv2. http://hdl.handle.net/10204/8726 en_ZA
dc.identifier.chicagocitation Mouton, F, L Leenen, and HS Venter "Social Engineering Attack Detection Model: SEADMv2." (2015) http://hdl.handle.net/10204/8726 en_ZA
dc.identifier.vancouvercitation Mouton F, Leenen L, Venter H. Social Engineering Attack Detection Model: SEADMv2. 2015; http://hdl.handle.net/10204/8726. en_ZA
dc.identifier.ris TY - Article AU - Mouton, F AU - Leenen, L AU - Venter, HS AB - Information security is a fast-growing discipline, and therefore the effectiveness of security measures to protect sensitive information needs to be increased. Since people are generally susceptible to manipulation, humans often prove to be the weak link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal definitions, attack frameworks, examples of attacks and detection models are concerned. This paper therefore proposes a revised version of the Social Engineering Attack Detection Model. The previous model was designed with a call centre environment in mind and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional communication, unidirectional communication or indirect communication. The proposed (and revised) Social Engineering Attack Detection Model addresses this problem by extending the model to cater for social engineering attacks that use bidirectional communication, unidirectional communication or indirect communication. The revised Social Engineering Attack Detection Model is further verified using published generalised social engineering attack examples from each of the three categories mentioned. DA - 2015-10 DB - ResearchSpace DP - CSIR KW - Bidirectional Communication KW - Indirect Communication KW - Social Engineering KW - Social Engineering Attack Examples KW - Social Engineering Attack Detection Model KW - Unidirectional Communication LK - https://researchspace.csir.co.za PY - 2015 SM - 978-1-4673-9403-1 T1 - Social Engineering Attack Detection Model: SEADMv2 TI - Social Engineering Attack Detection Model: SEADMv2 UR - http://hdl.handle.net/10204/8726 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record