4.5 Article

Panning for gold: Automatically analysing online social engineering attack surfaces

期刊

COMPUTERS & SECURITY
卷 69, 期 -, 页码 18-34

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2016.12.013

关键词

Social engineering; Vulnerability analysis; Open source intelligence; Social networks; Competitive intelligence

资金

  1. EPSRC through Lancaster University [EP/K50421X/1]
  2. EPSRC [EP/M002780/1] Funding Source: UKRI
  3. Engineering and Physical Sciences Research Council [EP/M002780/1, EP/K50421X/1] Funding Source: researchfish
  4. PETRAS [S&S(S)] Funding Source: researchfish

向作者/读者索取更多资源

The process of social engineering targets people rather than IT infrastructure. Attackers use deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a target to disclose sensitive information or to interact with a malicious payload. The creation of such hooks requires background information on targets. Individuals are increasingly releasing information about themselves online, particularly on social networks. Though existing research has demonstrated the social engineering risks posed by such open source intelligence, this has been accomplished either through resource-intensive manual analysis or via interactive information harvesting techniques. As manual analysis of large-scale online information is impractical, and interactive methods risk alerting the target, alternatives are desirable. In this paper, we demonstrate that key information pertinent to social engineering attacks on organisations can be passively harvested on a large-scale in an automated fashion. We address two key problems. We demonstrate that it is possible to automatically identify employees of an organisation using only information which is visible to a remote attacker as a member of the public. Secondly, we show that, once identified, employee profiles can be linked across multiple online social networks to harvest additional information pertinent to successful social engineering attacks. We further demonstrate our approach through analysis of the, social engineering attack surface of real critical infrastructure organisations. Based on our analysis we propose a set of countermeasures including an automated social engineering vulnerability scanner that organisations can use to analyse their exposure to potential social engineering attacks arising from open source intelligence. (C) 2017 The Authors. Published by Elsevier Ltd.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据