Reference Hub1
Using Attack Graphs to Analyze Social Engineering Threats

Using Attack Graphs to Analyze Social Engineering Threats

Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin
Copyright: © 2015 |Volume: 6 |Issue: 2 |Pages: 23
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466678668|DOI: 10.4018/IJSSE.2015040103
Cite Article Cite Article

MLA

Beckers, Kristian, et al. "Using Attack Graphs to Analyze Social Engineering Threats." IJSSE vol.6, no.2 2015: pp.47-69. http://doi.org/10.4018/IJSSE.2015040103

APA

Beckers, K., Krautsevich, L., & Yautsiukhin, A. (2015). Using Attack Graphs to Analyze Social Engineering Threats. International Journal of Secure Software Engineering (IJSSE), 6(2), 47-69. http://doi.org/10.4018/IJSSE.2015040103

Chicago

Beckers, Kristian, Leanid Krautsevich, and Artsiom Yautsiukhin. "Using Attack Graphs to Analyze Social Engineering Threats," International Journal of Secure Software Engineering (IJSSE) 6, no.2: 47-69. http://doi.org/10.4018/IJSSE.2015040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The acquisition of information about computer systems by mostly non-technical means is called social engineering. Most critical systems are vulnerable to social threats, even when technical security is high. Social engineering is a technique that: (i) does not require any (advanced) technical tools, (ii) can be used by anyone, (iii) is cheap, (iv) almost impossible to eliminate completely. The integration of social engineering attackers with other attackers, such as software or network ones, is missing so far. Existing research focuses on classifying and analyzing social engineering attacks. The authors' contribution is to consider social engineering exploits together with technical vulnerabilities. The authors introduce a method for the integration of social engineering exploits into attack graphs and propose a simple quantitative analysis of the graphs that helps to develop a comprehensive defensive strategy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.