{"title":"Social Engineering Defender (SE.Def): Human Emotion Factor Based Classification and Defense against Social Engineering Attacks","authors":"Adarsh S. V. Nair, Rathnakar Achary","doi":"10.1109/ICAIA57370.2023.10169678","DOIUrl":null,"url":null,"abstract":"One of the weakest links in any security system is neither the devices used nor the programs running on them; but the human beings using these devices. Most cyberattacks are initiated by human error. Hackers always use the most accessible and effective social engineering techniques to attack. Simply put, it is the art of manipulating people into sharing sensitive and confidential information. This research proposes a framework with four modules, namely, a source analyzer, a content classifier and analyzer, a link analyzer, and a risk reporting module, as a social engineering defender system for categorizing the risks before the email reaches the inbox of the user. Before it reaches the end user’s inbox, the system blocks the emails the social engineering defender has marked as “very high risk”.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIA57370.2023.10169678","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the weakest links in any security system is neither the devices used nor the programs running on them; but the human beings using these devices. Most cyberattacks are initiated by human error. Hackers always use the most accessible and effective social engineering techniques to attack. Simply put, it is the art of manipulating people into sharing sensitive and confidential information. This research proposes a framework with four modules, namely, a source analyzer, a content classifier and analyzer, a link analyzer, and a risk reporting module, as a social engineering defender system for categorizing the risks before the email reaches the inbox of the user. Before it reaches the end user’s inbox, the system blocks the emails the social engineering defender has marked as “very high risk”.