Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population

Hassan Halawa, K. Beznosov, Yazan Boshmaf, Baris Coskun, M. Ripeanu, E. Santos-Neto
{"title":"Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population","authors":"Hassan Halawa, K. Beznosov, Yazan Boshmaf, Baris Coskun, M. Ripeanu, E. Santos-Neto","doi":"10.1145/3011883.3011885","DOIUrl":null,"url":null,"abstract":"The orthodox paradigm to defend against automated social-engineering attacks in large-scale socio-technical systems is reactive and victim-agnostic. Defenses generally focus on identifying the attacks/attackers (e.g., phishing emails, social-bot infiltrations, malware offered for download). To change the status quo, we propose to identify, even if imperfectly, the vulnerable user population, that is, the users that are likely to fall victim to such attacks. Once identified, information about the vulnerable population can be used in two ways. First, the vulnerable population can be influenced by the defender through several means including: education, specialized user experience, extra protection layers and watchdogs. In the same vein, information about the vulnerable population can ultimately be used to fine-tune and reprioritize defense mechanisms to offer differentiated protection, possibly at the cost of additional friction generated by the defense mechanism. Secondly, information about the user population can be used to identify an attack (or compromised users) based on differences between the general and the vulnerable population. This paper considers the implications of the proposed paradigm on existing defenses in three areas (phishing of user credentials, malware distribution and socialbot infiltration) and discusses how using knowledge of the vulnerable population can enable more robust defenses.","PeriodicalId":408939,"journal":{"name":"Proceedings of the 2016 New Security Paradigms Workshop","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2016 New Security Paradigms Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3011883.3011885","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

The orthodox paradigm to defend against automated social-engineering attacks in large-scale socio-technical systems is reactive and victim-agnostic. Defenses generally focus on identifying the attacks/attackers (e.g., phishing emails, social-bot infiltrations, malware offered for download). To change the status quo, we propose to identify, even if imperfectly, the vulnerable user population, that is, the users that are likely to fall victim to such attacks. Once identified, information about the vulnerable population can be used in two ways. First, the vulnerable population can be influenced by the defender through several means including: education, specialized user experience, extra protection layers and watchdogs. In the same vein, information about the vulnerable population can ultimately be used to fine-tune and reprioritize defense mechanisms to offer differentiated protection, possibly at the cost of additional friction generated by the defense mechanism. Secondly, information about the user population can be used to identify an attack (or compromised users) based on differences between the general and the vulnerable population. This paper considers the implications of the proposed paradigm on existing defenses in three areas (phishing of user credentials, malware distribution and socialbot infiltration) and discusses how using knowledge of the vulnerable population can enable more robust defenses.
收获低挂的果实:通过关注易受攻击的人群来防御自动化的大规模网络入侵
在大规模社会技术系统中防御自动化社会工程攻击的正统范式是反应性的和受害者不可知论的。防御通常侧重于识别攻击/攻击者(例如,网络钓鱼电子邮件,社交机器人渗透,提供下载的恶意软件)。为了改变现状,我们建议即使不完美,也要识别易受攻击的用户群体,即可能成为此类攻击受害者的用户。一旦确定,关于弱势群体的信息可以以两种方式使用。首先,弱势群体可以通过以下几种方式受到防御者的影响:教育、专门的用户体验、额外的保护层和监督机构。同样,关于弱势群体的信息最终可以用于微调和重新确定防御机制的优先级,以提供差异化的保护,这可能以防御机制产生额外摩擦为代价。其次,基于普通用户和易受攻击用户之间的差异,可以使用有关用户群体的信息来识别攻击(或受损用户)。本文考虑了在三个领域(用户凭证的网络钓鱼,恶意软件分发和社交机器人渗透)中所提出的范式对现有防御的影响,并讨论了如何利用弱势群体的知识来实现更强大的防御。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信