Finite state machine for the social engineering attack detection model : SEADM

dc.contributor.authorMouton, Francois
dc.contributor.authorNottingham, Alastair
dc.contributor.authorLeenen, Louise
dc.contributor.authorVenter, H.S. (Hein)
dc.contributor.emailhventer@cs.up.ac.zaen_ZA
dc.date.accessioned2019-03-04T09:54:41Z
dc.date.available2019-03-04T09:54:41Z
dc.date.issued2018-06
dc.descriptionBased on: “Underlying Finite State Machine for the Social Engineering Attack Detection Model”, by F. Mouton, A. Nottingham, L. Leenen and H.S. Venter which appeared in the Proceedings of Information Security South African (ISSA) 2017, Johannesburg, 16 & 17 August 2017.en_ZA
dc.description.abstractInformation security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. Human operators are one of the weakest links in the security chain as they are highly susceptible to manipulation. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy with respect to formal definitions, attack frameworks, and examples of attacks and detection models. In order to formally address social engineering in a broad context, this paper proposes the underlying abstract finite state machine of the Social Engineering Attack Detection Model (SEADM). The model has been shown to successfully thwart social engineering attacks utilising either bidirectional communication, unidirectional communication or indirect communication. Proposing and exploring the underlying finite state machine of the model allows one to have a clearer overview of the mental processing performed within the model. While the current model provides a general procedural template for implementing detection mechanisms for social engineering attacks, the finite state machine provides a more abstract and extensible model that highlights the inter-connections between task categories associated with different scenarios. The finite state machine is intended to help facilitate the incorporation of organisation specific extensions by grouping similar activities into distinct categories, subdivided into one or more states. The finite state machine is then verified by applying it to representative social engineering attack scenarios from all three streams of possible communication. This verifies that all the capabilities of the SEADM are kept in tact, whilst being improved, by the proposed finite state machine.en_ZA
dc.description.departmentComputer Scienceen_ZA
dc.description.librarianam2019en_ZA
dc.description.urihttp://www.saiee.org.za/DirectoryDisplay/DirectoryCMSPages.aspx?name=Publications#id=1588&dirname=ARJ&dirid=337en_ZA
dc.identifier.citationMouton, F., Nottingham, A., Leenen, L. et al. 2018, 'Finite state machine for the social engineering attack detection model : SEADM', SAIEE Africa Research Journal, vol. 109, no. 2, pp. 133-147.en_ZA
dc.identifier.issn1991-1696
dc.identifier.urihttp://hdl.handle.net/2263/68547
dc.language.isoenen_ZA
dc.publisherSouth African Institute of Electrical Engineersen_ZA
dc.rights© 2018 South African Institute of Electrical Engineersen_ZA
dc.subjectBidirectional communicationen_ZA
dc.subjectFinite state machineen_ZA
dc.subjectIndirect communicationen_ZA
dc.subjectSocial engineeringen_ZA
dc.subjectSocial engineering attack examplesen_ZA
dc.subjectSocial engineering attack detection modelen_ZA
dc.subjectSocial engineering attack frameworken_ZA
dc.subjectUnidirectional communicationen_ZA
dc.subjectSecurity of dataen_ZA
dc.subjectSensitive informationen_ZA
dc.subjectManipulation techniquesen_ZA
dc.subjectFormal definitionen_ZA
dc.subjectDetection mechanismen_ZA
dc.subjectAttack detectionen_ZA
dc.subjectFinite automataen_ZA
dc.titleFinite state machine for the social engineering attack detection model : SEADMen_ZA
dc.typeArticleen_ZA

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Mouton_Finite_2018.pdf
Size:
380.99 KB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: