2023
DOI: 10.32604/cmc.2023.032373
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering Attack Classifications on Social Media Using Deep燣earning

Abstract: In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 26 publications
0
3
0
1
Order By: Relevance
“…Para finalizar, el artículo en el Aun et al (2023) desarrollan un modelo de aprendizaje profundo RNN-LSTM capaz de identificar con alta precisión diferentes tipos de ataques de ingeniería social en publicaciones de redes sociales, como suplantación de identidad y phishing. Utilizando un pipeline de detección que analiza la fuente, el grafo social y el sentimiento de las publicaciones, el modelo logra clasificar estas amenazas con 0.84 de precisión y 0.81 de tasa de recuerdo, superando a otras técnicas de aprendizaje automático.…”
Section: Revista Multidisciplinar G-ner@ndo Isnn: 2806-5905unclassified
“…Para finalizar, el artículo en el Aun et al (2023) desarrollan un modelo de aprendizaje profundo RNN-LSTM capaz de identificar con alta precisión diferentes tipos de ataques de ingeniería social en publicaciones de redes sociales, como suplantación de identidad y phishing. Utilizando un pipeline de detección que analiza la fuente, el grafo social y el sentimiento de las publicaciones, el modelo logra clasificar estas amenazas con 0.84 de precisión y 0.81 de tasa de recuerdo, superando a otras técnicas de aprendizaje automático.…”
Section: Revista Multidisciplinar G-ner@ndo Isnn: 2806-5905unclassified
“…The best performance is achieved with an ensemble approach for the identification and classification of crimerelated tweets that uses logistic regression (LR), SVMs, KNN, a decision tree (DT), and an RF classifier assigned the weights of 1, 2, 1, and 1, respectively, ensemble together via a soft weighted voting classifier along with a term frequency-inverse document frequency (TF-IDF) vectorizer with an accuracy of 96.2% on the testing dataset [41]. When compared to the ground truth labeled by network experts, an RNN-LSTM model that was trained to identify five different social engineering attacks (SEA) that may show signs of information gathering achieves classification precision and recall scores of 0.84 and 0.81, respectively [42].…”
Section: Related Workmentioning
confidence: 99%
“…Once we had collected a sufficient amount of data, we developed a pipeline for data pre-processing that was specifically designed for the detection of social engineering attacks (SEAD). This pipeline allowed us to clean and prepare the data for analysis, which was essential for the development of ML model [21,22]. To identify posts that suggest a malicious intent to gather information, the SEADS model uses a variety of variables, including keyword matching, provenance filtering, and pattern recognition.…”
Section: Introductionmentioning
confidence: 99%