Automatic Detection of Social Engineering Attacks Using Dialog
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: Cyber attacker target the weakest part of security system which is increasingly the people who use and interact with a computer-based system is the easiest way for cyber attacker to attack the user. A separate research area is provided in order to protect computer assets. But by exploiting human vulnerabilities, an attacker can find a way for many computer-based defences. Phishing is the most common attack of social engineering attacks where someone pretend to be an authority figure or someone your trust to gain access to your login information. A robust and novel approach is needed to detect social engineering attacks and to send alert to the user while sharing confidential information to the unauthorized target. We proposed an approachwhich uses a dynamic Topic Blacklist (TBL) to verify the discussion topics of each line of text generated by the potential attacker. Using Natural language processing and machine learning, system can automatically detectsocial engineering attacks. Our approach is applicable to any attack vector since it depends only on the dialog text. System can recognize shortcut as well as incorrect grammar.
Authors and Affiliations
Pooja kale, Shital Kashiwant, Nisha Kamble, Subodh Awate Prof. Sonali Tidke
Fmfc: Fuzzy Based Improved Mutual Friend Crawling
Abstract: Online Social networks are becoming an important part of research in every field. Crawling such networks and extracting data from them is a very difficult task. Till date, many crawling techniques have been des...
Multi-Party Access Control Mechanism in Online Social Networks
Abstract: Social networking is an essential part of life for people around the world these days. Social networking is a form of social media, used for interactive, educational, informational or entertaining purpo...
Big Data Analysis and Its Scheduling Policy – Hadoop
Abstract: This paper is deals with Parallel Distributed system. Hadoop has become a central platform tostore big data through its Hadoop Distributed File System (HDFS) as well as to run analytics on this stored big...
Load Balancing in Multi-Cloud with Performance Analysis
Abstract: Cloud computing enables distributed file system mainly for large scale data storage and data access. The main character is that the contents of the file system can be stored in multiple machines which tra...
Lossless and Lossy Polynomial Image Compression
Abstract: This paper introduced a new hybrid image compression system of the lossless non-linear polynomial coding base and lossy linear polynomial base. The results are promising, since it would achieve high compression...