Skip to main content

Social Engineering Attack Detection and Data Protection Model (SEADDPM)

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 811))

Abstract

Our modern life has been influenced in myriad ways by the Internet and digital technologies along with its every ameliorating advancement. But its omnipresence has consequently turned out be a boon for cyber attackers and intruders. The colossal impact of the Internet and the widespread growth of E-business have cleared the way for cyber fraudulence whereby attackers tend to target various public agencies especially the employees of Call Centre. The intruders have been using various techniques and tools of Social Engineering for the purpose of security breach and data leakage. This paper proposes a Social Engineering Attack Detection and Data Protection Model which can be used by the employees of any agency to not only detect the social engineering attacks but also to protect their files containing sensitive data and information from an attacker. Hence, this model will be very helpful and effective in resisting the attacker from manipulating himself or herself, in ensuring data protection and in safeguarding the security of employees.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack examples, templates and scenarios. In: Computers and Security (2016)

    Google Scholar 

  2. Hadnagy, C.: Social Engineering: The Art of Human Hacking, 1st edn. Wiley Publishing Inc., Indianapolis, Indiana (2011)

    Google Scholar 

  3. Mataracioglu, T., Ozkan, S., Hackney, R.: Towards a security lifecycle model against social engineering attacks: SLM-SEA. In: Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, pp. 1–10 (2013)

    Google Scholar 

  4. Hadnagy, C.J., Aharoni, M., O’Gorman, J.: Social engineering capture the flag results. In: The Defcon 18 Social Engineering CTF Report. http://www.social-engineer.org/resources/sectf/Social-Engineer_CTF_Report.pdf. Accessed 02 Aug 2010

  5. Bican, C.: Social Engineering Attacks. TUBITAK UEKAE—National Gate of Information Security. http://www.bilgiguvenligi.gov.tr/teknik-yazilar-kategorisi/sosyal-muhendislik-saldirilari.html?Itemid=6. Accessed May 2008

  6. Huber, M., Kowalski, S., Nohlberg, M., Tjoa, S.: Towards automating social engineering using social networking sites. In: International Conference on Computational Science and Engineering, vol. 3, pp. 117–124. IEEE, Vancouver, BC, Canada (2009)

    Google Scholar 

  7. Nohlberg, M.: Why humans are the weakest link. In: Gupta, M., Sharman, R. (eds.) Social and Human Elements in Information Security: Emerging Trends and Countermeasures, pp. 15. IGI Global, Hershey, PA (2008)

    Google Scholar 

  8. Tarakcioglu, T.: Analysis of social engineering attacks in Turkey. J. Natl. Res. Inst. Electron. Cryptol. (UEKAE) 2(4), 88–95 (2010)

    Google Scholar 

  9. Bezuidenhout, M., Mouton, F., Venter, H.S.: Social engineering attack detection model: SEADM. In: Information Security for South Africa (ISSA), pp. 1–8. IEEE, Johannesburg, South Africa (2010)

    Google Scholar 

  10. Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack detection model: SEADMv2. In: International Conference on Cyberworlds, pp. 216–223. IEEE, Visby, Sweden (2015)

    Google Scholar 

  11. Mouton, F., Teixeira, M., Meyer, T.: Benchmarking a mobile implementation of the social engineering prevention training tool. In: Information Security for South Africa (ISSA), pp. 1–9. IEEE, Johannesburg, South Africa (2017)

    Google Scholar 

  12. Sandouka, H., Cullen, A.J., Mann, I.: Social engineering detection using neural networks. In: International Conference on CyberWorlds, pp. 273–278. IEEE, Bradford, UK (2009)

    Google Scholar 

  13. Hoeschele, M., Rogers, M.: Detecting Social Engineering. In: Pollitt, M., Shenoi, S. (eds.) Advances in Digital Forensics. Digital Forensics 2005. IFIP—The International Federation for Information Processing, vol. 194, pp. 67–77. Springer, Boston, MA (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Arindam Dan or Sumit Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dan, A., Gupta, S. (2019). Social Engineering Attack Detection and Data Protection Model (SEADDPM). In: Chakraborty, M., Chakrabarti, S., Balas, V., Mandal, J. (eds) Proceedings of International Ethical Hacking Conference 2018. Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore. https://doi.org/10.1007/978-981-13-1544-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1544-2_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1543-5

  • Online ISBN: 978-981-13-1544-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics