2018
DOI: 10.31799/1684-8853-2018-6-74-81
|View full text |Cite
|
Sign up to set email alerts
|

Search for the shortest trajectory of a social engeneering attack between a pair of users in a graph with transition probabilities

Abstract: Introduction: Social engineering attacks can be divided into two types: direct (one-way) and multi-pass ones, passing through a chain of users. Normally, there are several propagation paths for a multi-pass social engineering attack between two users. Estimates of the probabilities of an attack to spread along different trajectories will differ. Purpose: Identification of the most critical (most probable) trajectory for a multi-pass social engineering attack between two users. Methods: Methods of searching, ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 15 publications
0
0
0
1
Order By: Relevance
“…Современная проблема достоверности теперь связана с компьютерной безопасностью [8,9]. Достоверность здесь рассматривается как временная или постоянная защита информации пользователей, получивших права доступа.…”
Section: Introductionunclassified
“…Современная проблема достоверности теперь связана с компьютерной безопасностью [8,9]. Достоверность здесь рассматривается как временная или постоянная защита информации пользователей, получивших права доступа.…”
Section: Introductionunclassified