Threat Detection for General Social Engineering Attack Using Machine Learning Techniques

03/15/2022
by   Zuoguang Wang, et al.
0

This paper explores the threat detection for general Social Engineering (SE) attack using Machine Learning (ML) techniques, rather than focusing on or limited to a specific SE attack type, e.g. email phishing. Firstly, this paper processes and obtains more SE threat data from the previous Knowledge Graph (KG), and then extracts different threat features and generates new datasets corresponding with three different feature combinations. Finally, 9 types of ML models are created and trained using the three datasets, respectively, and their performance are compared and analyzed with 27 threat detectors and 270 times of experiments. The experimental results and analyses show that: 1) the ML techniques are feasible in detecting general SE attacks and some ML models are quite effective; ML-based SE threat detection is complementary with KG-based approaches; 2) the generated datasets are usable and the SE domain ontology proposed in previous work can dissect SE attacks and deliver the SE threat features, allowing it to be used as a data model for future research. Besides, more conclusions and analyses about the characteristics of different ML detectors and the datasets are discussed.

READ FULL TEXT

page 9

page 12

research
11/17/2022

Machine Learning for Software Engineering: A Tertiary Study

Machine learning (ML) techniques increase the effectiveness of software ...
research
02/21/2019

Analysis of Recent Attacks based on Social Engineering Techniques

This paper attempts to strengthen the pursued research on social enginee...
research
08/29/2023

TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks

Data breaches resulting from targeted attacks against organizations, e.g...
research
09/07/2017

Semantic Preserving Embeddings for Generalized Graphs

A new approach to the study of Generalized Graphs as semantic data struc...
research
08/25/2022

Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study

Proactive approaches to security, such as adversary emulation, leverage ...
research
05/28/2021

Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples

Social engineering has posed a serious threat to cyberspace security. To...
research
06/21/2023

Cryptographic ransomware encryption detection: Survey

The ransomware threat has loomed over our digital life since 1989. Crimi...

Please sign up or login with your details

Forgot password? Click here to reset