Reference Hub18
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling

A Risk Analysis Framework for Social Engineering Attack Based on User Profiling

Ziwei Ye, Yuanbo Guo, Ankang Ju, Fushan Wei, Ruijie Zhang, Jun Ma
Copyright: © 2020 |Volume: 32 |Issue: 3 |Pages: 13
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781522583707|DOI: 10.4018/JOEUC.2020070104
Cite Article Cite Article

MLA

Ye, Ziwei, et al. "A Risk Analysis Framework for Social Engineering Attack Based on User Profiling." JOEUC vol.32, no.3 2020: pp.37-49. http://doi.org/10.4018/JOEUC.2020070104

APA

Ye, Z., Guo, Y., Ju, A., Wei, F., Zhang, R., & Ma, J. (2020). A Risk Analysis Framework for Social Engineering Attack Based on User Profiling. Journal of Organizational and End User Computing (JOEUC), 32(3), 37-49. http://doi.org/10.4018/JOEUC.2020070104

Chicago

Ye, Ziwei, et al. "A Risk Analysis Framework for Social Engineering Attack Based on User Profiling," Journal of Organizational and End User Computing (JOEUC) 32, no.3: 37-49. http://doi.org/10.4018/JOEUC.2020070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Social engineering attacks are becoming serious threats to cloud service. Social engineering attackers could get Cloud service custom privacy information or attack virtual machine images directly. Existing security analysis instruments are difficult to quantify the social engineering attack risk, resulting in invalid defense guidance for social engineering attacks. In this article, a risk analysis framework for social engineering attack is proposed based on user profiling. The framework provides a pathway to quantitatively calculate the possibility of being compromised by social engineering attack and potential loss, so as to effectively complement current security assessment instruments. The frequency of related operations is used to profile and group users for respective risk calculation, and other features such as security awareness and capability of protection mechanism are also considered. Finally, examples are given to illustrate how to use the framework in actual scenario and apply it to security assessment.