Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis

Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient inform...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2023-02
Hauptverfasser: Rogers, Glynn, Crompton, Malcolm, Sapre, Gaurav, Chan, Jonathan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Rogers, Glynn
Crompton, Malcolm
Sapre, Gaurav
Chan, Jonathan
description Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2780574618</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2780574618</sourcerecordid><originalsourceid>FETCH-proquest_journals_27805746183</originalsourceid><addsrcrecordid>eNqNjMFqwlAQRR-FgmL9h4GuA_HFmGxFLV0UulC6DWMc48jrTPvmZZF9P7yx-AFdXTj3cB7c1BfFIquX3k_c3Oya57lfVb4si6n72VKiNrEKoJxg_UmBNeIf0DPstWUMsJOOhSiydPDRB6GIRw6cBmCBjUoaD5J2gAMeA8EWE0JvNxsF3mO6aKeCgY1O8KZdFsYaRliPbDC2J_d4xmA0v-_MPb_sDpvX7Cvqd0-Wmqv2cZSt8VWdl9VytaiL_1m_qjVSgw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2780574618</pqid></control><display><type>article</type><title>Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis</title><source>Free E- Journals</source><creator>Rogers, Glynn ; Crompton, Malcolm ; Sapre, Gaurav ; Chan, Jonathan</creator><creatorcontrib>Rogers, Glynn ; Crompton, Malcolm ; Sapre, Gaurav ; Chan, Jonathan</creatorcontrib><description>Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Contingency ; Cybersecurity ; Data processing ; Engineers ; Linear analysis ; Nonuniformity ; Orthogonality ; Probabilistic inference ; Statistical analysis ; Tables (data)</subject><ispartof>arXiv.org, 2023-02</ispartof><rights>2023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Rogers, Glynn</creatorcontrib><creatorcontrib>Crompton, Malcolm</creatorcontrib><creatorcontrib>Sapre, Gaurav</creatorcontrib><creatorcontrib>Chan, Jonathan</creatorcontrib><title>Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis</title><title>arXiv.org</title><description>Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections.</description><subject>Contingency</subject><subject>Cybersecurity</subject><subject>Data processing</subject><subject>Engineers</subject><subject>Linear analysis</subject><subject>Nonuniformity</subject><subject>Orthogonality</subject><subject>Probabilistic inference</subject><subject>Statistical analysis</subject><subject>Tables (data)</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNjMFqwlAQRR-FgmL9h4GuA_HFmGxFLV0UulC6DWMc48jrTPvmZZF9P7yx-AFdXTj3cB7c1BfFIquX3k_c3Oya57lfVb4si6n72VKiNrEKoJxg_UmBNeIf0DPstWUMsJOOhSiydPDRB6GIRw6cBmCBjUoaD5J2gAMeA8EWE0JvNxsF3mO6aKeCgY1O8KZdFsYaRliPbDC2J_d4xmA0v-_MPb_sDpvX7Cvqd0-Wmqv2cZSt8VWdl9VytaiL_1m_qjVSgw</recordid><startdate>20230227</startdate><enddate>20230227</enddate><creator>Rogers, Glynn</creator><creator>Crompton, Malcolm</creator><creator>Sapre, Gaurav</creator><creator>Chan, Jonathan</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20230227</creationdate><title>Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis</title><author>Rogers, Glynn ; Crompton, Malcolm ; Sapre, Gaurav ; Chan, Jonathan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_27805746183</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Contingency</topic><topic>Cybersecurity</topic><topic>Data processing</topic><topic>Engineers</topic><topic>Linear analysis</topic><topic>Nonuniformity</topic><topic>Orthogonality</topic><topic>Probabilistic inference</topic><topic>Statistical analysis</topic><topic>Tables (data)</topic><toplevel>online_resources</toplevel><creatorcontrib>Rogers, Glynn</creatorcontrib><creatorcontrib>Crompton, Malcolm</creatorcontrib><creatorcontrib>Sapre, Gaurav</creatorcontrib><creatorcontrib>Chan, Jonathan</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rogers, Glynn</au><au>Crompton, Malcolm</au><au>Sapre, Gaurav</au><au>Chan, Jonathan</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis</atitle><jtitle>arXiv.org</jtitle><date>2023-02-27</date><risdate>2023</risdate><eissn>2331-8422</eissn><abstract>Social Engineering has emerged as a significant threat in cyber security. In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient information for accessing the victim's accounts etc. We utilise the developing understanding of human information processing in the Information Sciences to characterise the vulnerability of the target to manipulation and to propose a form of countermeasure. Our focus is on the possibility of the social engineer being able to build the victim's profile by, in part, inferring personal attribute values from statistical information available either informally, from general knowledge, or, more formally, from some public database. We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our proposed countermeasure. This is based on the observation that inference relies on a high degree of non-uniformity and exploits the orthogonality of the analysis to define the measure in terms of subspace projections.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2023-02
issn 2331-8422
language eng
recordid cdi_proquest_journals_2780574618
source Free E- Journals
subjects Contingency
Cybersecurity
Data processing
Engineers
Linear analysis
Nonuniformity
Orthogonality
Probabilistic inference
Statistical analysis
Tables (data)
title Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T17%3A53%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Detection%20and%20Amelioration%20of%20Social%20Engineering%20Vulnerability%20in%20Contingency%20Table%20Data%20using%20an%20Orthogonalised%20Log-linear%20Analysis&rft.jtitle=arXiv.org&rft.au=Rogers,%20Glynn&rft.date=2023-02-27&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2780574618%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2780574618&rft_id=info:pmid/&rfr_iscdi=true