{"title":"社会工程防御者(SE.Def):基于人类情感因素的分类和防御社会工程攻击","authors":"Adarsh S. V. Nair, Rathnakar Achary","doi":"10.1109/ICAIA57370.2023.10169678","DOIUrl":null,"url":null,"abstract":"One of the weakest links in any security system is neither the devices used nor the programs running on them; but the human beings using these devices. Most cyberattacks are initiated by human error. Hackers always use the most accessible and effective social engineering techniques to attack. Simply put, it is the art of manipulating people into sharing sensitive and confidential information. This research proposes a framework with four modules, namely, a source analyzer, a content classifier and analyzer, a link analyzer, and a risk reporting module, as a social engineering defender system for categorizing the risks before the email reaches the inbox of the user. Before it reaches the end user’s inbox, the system blocks the emails the social engineering defender has marked as “very high risk”.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Social Engineering Defender (SE.Def): Human Emotion Factor Based Classification and Defense against Social Engineering Attacks\",\"authors\":\"Adarsh S. V. Nair, Rathnakar Achary\",\"doi\":\"10.1109/ICAIA57370.2023.10169678\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the weakest links in any security system is neither the devices used nor the programs running on them; but the human beings using these devices. Most cyberattacks are initiated by human error. Hackers always use the most accessible and effective social engineering techniques to attack. Simply put, it is the art of manipulating people into sharing sensitive and confidential information. This research proposes a framework with four modules, namely, a source analyzer, a content classifier and analyzer, a link analyzer, and a risk reporting module, as a social engineering defender system for categorizing the risks before the email reaches the inbox of the user. Before it reaches the end user’s inbox, the system blocks the emails the social engineering defender has marked as “very high risk”.\",\"PeriodicalId\":196526,\"journal\":{\"name\":\"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)\",\"volume\":\"109 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIA57370.2023.10169678\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIA57370.2023.10169678","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Social Engineering Defender (SE.Def): Human Emotion Factor Based Classification and Defense against Social Engineering Attacks
One of the weakest links in any security system is neither the devices used nor the programs running on them; but the human beings using these devices. Most cyberattacks are initiated by human error. Hackers always use the most accessible and effective social engineering techniques to attack. Simply put, it is the art of manipulating people into sharing sensitive and confidential information. This research proposes a framework with four modules, namely, a source analyzer, a content classifier and analyzer, a link analyzer, and a risk reporting module, as a social engineering defender system for categorizing the risks before the email reaches the inbox of the user. Before it reaches the end user’s inbox, the system blocks the emails the social engineering defender has marked as “very high risk”.