Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis
Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient inform...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2023-02 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Rogers, Glynn Crompton, Malcolm Sapre, Gaurav Chan, Jonathan |
description | Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2780574618</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2780574618</sourcerecordid><originalsourceid>FETCH-proquest_journals_27805746183</originalsourceid><addsrcrecordid>eNqNjMFqwlAQRR-FgmL9h4GuA_HFmGxFLV0UulC6DWMc48jrTPvmZZF9P7yx-AFdXTj3cB7c1BfFIquX3k_c3Oya57lfVb4si6n72VKiNrEKoJxg_UmBNeIf0DPstWUMsJOOhSiydPDRB6GIRw6cBmCBjUoaD5J2gAMeA8EWE0JvNxsF3mO6aKeCgY1O8KZdFsYaRliPbDC2J_d4xmA0v-_MPb_sDpvX7Cvqd0-Wmqv2cZSt8VWdl9VytaiL_1m_qjVSgw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2780574618</pqid></control><display><type>article</type><title>Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis</title><source>Free E- Journals</source><creator>Rogers, Glynn ; Crompton, Malcolm ; Sapre, Gaurav ; Chan, Jonathan</creator><creatorcontrib>Rogers, Glynn ; Crompton, Malcolm ; Sapre, Gaurav ; Chan, Jonathan</creatorcontrib><description>Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Contingency ; Cybersecurity ; Data processing ; Engineers ; Linear analysis ; Nonuniformity ; Orthogonality ; Probabilistic inference ; Statistical analysis ; Tables (data)</subject><ispartof>arXiv.org, 2023-02</ispartof><rights>2023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Rogers, Glynn</creatorcontrib><creatorcontrib>Crompton, Malcolm</creatorcontrib><creatorcontrib>Sapre, Gaurav</creatorcontrib><creatorcontrib>Chan, Jonathan</creatorcontrib><title>Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis</title><title>arXiv.org</title><description>Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections.</description><subject>Contingency</subject><subject>Cybersecurity</subject><subject>Data processing</subject><subject>Engineers</subject><subject>Linear analysis</subject><subject>Nonuniformity</subject><subject>Orthogonality</subject><subject>Probabilistic inference</subject><subject>Statistical analysis</subject><subject>Tables (data)</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNjMFqwlAQRR-FgmL9h4GuA_HFmGxFLV0UulC6DWMc48jrTPvmZZF9P7yx-AFdXTj3cB7c1BfFIquX3k_c3Oya57lfVb4si6n72VKiNrEKoJxg_UmBNeIf0DPstWUMsJOOhSiydPDRB6GIRw6cBmCBjUoaD5J2gAMeA8EWE0JvNxsF3mO6aKeCgY1O8KZdFsYaRliPbDC2J_d4xmA0v-_MPb_sDpvX7Cvqd0-Wmqv2cZSt8VWdl9VytaiL_1m_qjVSgw</recordid><startdate>20230227</startdate><enddate>20230227</enddate><creator>Rogers, Glynn</creator><creator>Crompton, Malcolm</creator><creator>Sapre, Gaurav</creator><creator>Chan, Jonathan</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20230227</creationdate><title>Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis</title><author>Rogers, Glynn ; Crompton, Malcolm ; Sapre, Gaurav ; Chan, Jonathan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_27805746183</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Contingency</topic><topic>Cybersecurity</topic><topic>Data processing</topic><topic>Engineers</topic><topic>Linear analysis</topic><topic>Nonuniformity</topic><topic>Orthogonality</topic><topic>Probabilistic inference</topic><topic>Statistical analysis</topic><topic>Tables (data)</topic><toplevel>online_resources</toplevel><creatorcontrib>Rogers, Glynn</creatorcontrib><creatorcontrib>Crompton, Malcolm</creatorcontrib><creatorcontrib>Sapre, Gaurav</creatorcontrib><creatorcontrib>Chan, Jonathan</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rogers, Glynn</au><au>Crompton, Malcolm</au><au>Sapre, Gaurav</au><au>Chan, Jonathan</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis</atitle><jtitle>arXiv.org</jtitle><date>2023-02-27</date><risdate>2023</risdate><eissn>2331-8422</eissn><abstract>Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2023-02 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2780574618 |
source | Free E- Journals |
subjects | Contingency Cybersecurity Data processing Engineers Linear analysis Nonuniformity Orthogonality Probabilistic inference Statistical analysis Tables (data) |
title | Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T17%3A53%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Detection%20and%20Amelioration%20of%20Social%20Engineering%20Vulnerability%20in%20Contingency%20Table%20Data%20using%20an%20Orthogonalised%20Log-linear%20Analysis&rft.jtitle=arXiv.org&rft.au=Rogers,%20Glynn&rft.date=2023-02-27&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2780574618%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2780574618&rft_id=info:pmid/&rfr_iscdi=true |