Abstract
The paper is devoted to the application of the method of randomized general indices in assessing potential damage to a company if confidential information is leaked due to malefactor’s social engineering attack. This assessment is used in a comparative analysis of the effectiveness of various measures aimed at increasing the level of user protection from the malefactor’s social engineering attacks.
The results were partially supported by RFBR, project No. 18-37-00340, and Governmental contract (SPIIRAS) No. 0073-2019-0003.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Azarov, A., Abramov, M., Tulupyev, A., Tulupyeva, T.: Models and algorithms for the information system’s users’ protection level probabilistic estimation. In: Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI 2016), vol. 2, pp. 39–46 (2016)
Azarov, A., Abramov, M., Tulupyeva, T., Tulupyev, A.: Users’ of Information System Protection Analysis from Malefactor’s Social Engineering Attacks Taking into Account Malefactor’s Competence Profile. Biologically Inspired Cognitive Architectures (BICA) for Young Scientists, pp. 25–30 (2016)
Azarov, A., Suvorova, A., Tulupyeva, T.: Changing the information system’s protection level from social engineering attacks, in case of reorganizing the information system’s users’ structure. In: II International Scientific-Practical Conference “Fuzzy Technologies in the Industry”, pp. 56–62 (2018)
Azarov, A., Suvorova, A.: Sustainability of the user’s social network graph to the social engineering attack actions: an approach based on genetic algorithms. In: XXII International Conference on Soft Computing and Measurement (SCM 2018), pp. 126–129 (2018)
Chereshkin, D.: Problemy obespecheniya informacionnoj bezopasnosti v novyh usloviyah. Informatizaciya i svyaz’, № 3, pp. 99–106 (2014)
Gupta, B., Tewari, A., Jain, A., Agrawal, D.: Fighting against phishing attacks: state of the art and future challenges. Neural Comput. Appl. 28, 3629–3654 (2017)
Hovanov, N., Kornikov, V., Seregin, I.: Qualitative information processing in DSS ASPID-3W for complex objects estimation under uncertainty. In: Proceedings of the International Conference “Informatics and Control”, pp. 808–816 (1997)
Hovanov, N., Kornikov, V., Seregin, I.: Randomized synthesis of fuzzy sets as a technique for multicriteria decision making under uncertainty. In: Proceedings of the International Conference “Fuzzy Logic and Applications”, pp. 281–288 (1997)
Hovanov, N., Kornikov, V., Tokin, I.: A mathematical methods system of decision making for developmental strategy under uncertainty. In: Global Environmental Change. Perspective of Remote Sensing and Geographic Information Systems, pp. 93–96 (1995)
Hovanov, N., Kolari, J.: Estimating the overall financial performance of Mexican banks using a new method for quantifying subjective information. J. Financ. Eng. 7(1), 59–77 (1998)
Hovanov, N., Fedotov, Yu., Zakharov, V.: The making of index numbers under uncertainty. In: Environmental Indices: Systems Analysis Approach, pp. 83–99 (1999)
Hovanov, N.: Evaluation of complex objects in the context of lack of information. In: Proceedings of the 7th International Scientific School “Modeling and Analysis of Safety and Risk in Complex Systems”, pp. 18–28 (2008)
Kharitonov, N., Maximov, A., Tulupyev, A.: Algebraic Bayesian networks: the use of parallel computing while maintaining various degrees of consistency. Stud. Syst. Decis. Control 199, 696–704 (2019)
Kotenko, I., Chechulin, A., Branitskiy, A.: Generation of source data for experiments with network attack detection software. J. Phys. Conf. Ser. 820, 12–33 (2017)
Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., Kusev, P.: Risk perceptions of cyber-security and precautionary behavior. Comput. Hum. Behav. 62, 5678–5693 (2017)
Shindarev, N., Bagretsov, G., Abramov, M., Tulupyeva, T., Suvorova, A.: Approach to identifying of employees profiles in websites of social networks aimed to analyze social engineering vulnerabilities. In: International Conference on Intelligent Information Technologies for Industry, pp. 441–447 (2017)
Struharik, R., Vukobratović, B.: A system for hardware aided decision tree ensemble evolution. J. Parallel Distrib. Comput. 112, 67–83 (2018)
Suleimanov, A., Abramov, M., Tulupyev, A.: Modelling of the social engineering attacks based on social graph of employees communications analysis. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS), pp. 801–805 (2018)
Tarasov, V.: On granular structures of measurement in ambient intelligence systems: Vassiliev’s and Belnap’s sensors and their communication models. Inf. Meas. Control Syst. 5, 65–74 (2013)
Terlizzi, M., Meirelles, F., Viegas Cortez da Cunha, M.: Behavior of Brazilian banks employees on Facebook and the cybersecurity governance. J. Appl. Secur. Res. 12, 224–252 (2017)
Tulupyev, A., Kharitonov, N., Zolotin, A.: Algebraic Bayesian networks: consistent fusion of partially intersected knowledge systems. In: The Second International Scientific and Practical Conference “Fuzzy Technologies in the Industry – FTI 2018”, pp. 109–115 (2018)
Vasileva, O., Kiyaev, V.: Monitoring and controlling the execution of the sea cargo port operation’s schedule based on multi-agent technologies. In: CEUR Workshop Proceedings of the 2nd International Scientific and Practical Conference “Fuzzy Technologies in the Industry – FTI”, vol. 2258, pp. 243–248 (2018)
Zadeh, L.: Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic. Fuzzy Sets Syst. 90(2), 111–127 (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Azarov, A., Vasileva, O., Tulupyeva, T. (2019). Randomized General Indices for Evaluating Damage Through Malefactor Social Engineering Attacks. In: Kuznetsov, S., Panov, A. (eds) Artificial Intelligence. RCAI 2019. Communications in Computer and Information Science, vol 1093. Springer, Cham. https://doi.org/10.1007/978-3-030-30763-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-30763-9_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30762-2
Online ISBN: 978-3-030-30763-9
eBook Packages: Computer ScienceComputer Science (R0)