Abstract
Our modern life has been influenced in myriad ways by the Internet and digital technologies along with its every ameliorating advancement. But its omnipresence has consequently turned out be a boon for cyber attackers and intruders. The colossal impact of the Internet and the widespread growth of E-business have cleared the way for cyber fraudulence whereby attackers tend to target various public agencies especially the employees of Call Centre. The intruders have been using various techniques and tools of Social Engineering for the purpose of security breach and data leakage. This paper proposes a Social Engineering Attack Detection and Data Protection Model which can be used by the employees of any agency to not only detect the social engineering attacks but also to protect their files containing sensitive data and information from an attacker. Hence, this model will be very helpful and effective in resisting the attacker from manipulating himself or herself, in ensuring data protection and in safeguarding the security of employees.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack examples, templates and scenarios. In: Computers and Security (2016)
Hadnagy, C.: Social Engineering: The Art of Human Hacking, 1st edn. Wiley Publishing Inc., Indianapolis, Indiana (2011)
Mataracioglu, T., Ozkan, S., Hackney, R.: Towards a security lifecycle model against social engineering attacks: SLM-SEA. In: Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, pp. 1–10 (2013)
Hadnagy, C.J., Aharoni, M., O’Gorman, J.: Social engineering capture the flag results. In: The Defcon 18 Social Engineering CTF Report. http://www.social-engineer.org/resources/sectf/Social-Engineer_CTF_Report.pdf. Accessed 02 Aug 2010
Bican, C.: Social Engineering Attacks. TUBITAK UEKAE—National Gate of Information Security. http://www.bilgiguvenligi.gov.tr/teknik-yazilar-kategorisi/sosyal-muhendislik-saldirilari.html?Itemid=6. Accessed May 2008
Huber, M., Kowalski, S., Nohlberg, M., Tjoa, S.: Towards automating social engineering using social networking sites. In: International Conference on Computational Science and Engineering, vol. 3, pp. 117–124. IEEE, Vancouver, BC, Canada (2009)
Nohlberg, M.: Why humans are the weakest link. In: Gupta, M., Sharman, R. (eds.) Social and Human Elements in Information Security: Emerging Trends and Countermeasures, pp. 15. IGI Global, Hershey, PA (2008)
Tarakcioglu, T.: Analysis of social engineering attacks in Turkey. J. Natl. Res. Inst. Electron. Cryptol. (UEKAE) 2(4), 88–95 (2010)
Bezuidenhout, M., Mouton, F., Venter, H.S.: Social engineering attack detection model: SEADM. In: Information Security for South Africa (ISSA), pp. 1–8. IEEE, Johannesburg, South Africa (2010)
Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack detection model: SEADMv2. In: International Conference on Cyberworlds, pp. 216–223. IEEE, Visby, Sweden (2015)
Mouton, F., Teixeira, M., Meyer, T.: Benchmarking a mobile implementation of the social engineering prevention training tool. In: Information Security for South Africa (ISSA), pp. 1–9. IEEE, Johannesburg, South Africa (2017)
Sandouka, H., Cullen, A.J., Mann, I.: Social engineering detection using neural networks. In: International Conference on CyberWorlds, pp. 273–278. IEEE, Bradford, UK (2009)
Hoeschele, M., Rogers, M.: Detecting Social Engineering. In: Pollitt, M., Shenoi, S. (eds.) Advances in Digital Forensics. Digital Forensics 2005. IFIP—The International Federation for Information Processing, vol. 194, pp. 67–77. Springer, Boston, MA (2006)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dan, A., Gupta, S. (2019). Social Engineering Attack Detection and Data Protection Model (SEADDPM). In: Chakraborty, M., Chakrabarti, S., Balas, V., Mandal, J. (eds) Proceedings of International Ethical Hacking Conference 2018. Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore. https://doi.org/10.1007/978-981-13-1544-2_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-1544-2_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1543-5
Online ISBN: 978-981-13-1544-2
eBook Packages: EngineeringEngineering (R0)