Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Social engineering attack defense method and device

An engineering and social technology, applied in the field of defense against social engineering attacks, can solve problems such as failure to meet user security protection needs, single protection mechanism, limitations, etc., and achieve the effect of meeting security protection needs

Active Publication Date: 2019-09-27
BEIJING UNIV OF POSTS & TELECOMM
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mechanism based on safety education focuses on formulating a series of safety rules to improve personal safety awareness. However, since people are not machines, negligence may occur at any time, and it takes a long time to train to improve, and the improvement effect varies from person to person. different, so this method is not reliable
The detection mechanism based on technical means starts from the social engineering attack, and detects the attack by extracting a series of features, which can achieve high accuracy and speed, but the detection method is single and limited to the specific form of the attack. The defense mechanism for social engineering attacks is relatively simple
Therefore, the existing detection and protection methods cannot meet the comprehensive safety protection needs of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social engineering attack defense method and device
  • Social engineering attack defense method and device
  • Social engineering attack defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0022] A user terminal (for example, a mobile phone, a tablet computer) may have multiple communication platforms, for example, China Mobile, China Unicom, WeChat, email, and the like. Users can communicate with the outside world or other terminals or servers through various communication platforms on the user terminal. For example, you can receive incoming calls or text messages through China Mobile or China Unicom, and you can receive text or voice messages, audio / video call requests, etc. through WeChat. Attackers can conduct social engineering attacks on users of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a social engineering attack defense method and device, and the method comprises the steps: obtaining the content of a communication message when a user terminal receives the communication message; extracting subject cognitive characteristic characteristics in the acquired content of the communication message; judging whether the communication message is a social engineering attack or not according to the extracted subject cognitive characteristic characteristics; under the condition that the communication message is a social engineering attack, selecting a defense measure according to the pre-evaluated user security awareness level of the user terminal; and executing a defense action on the communication message according to the selected defense measure. According to the scheme, adaptive safety protection is provided for the user, and all-around safety protection requirements of the user are met.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a defense method and device for social engineering attacks. Background technique [0002] Social engineering refers to the use of people's psychological weaknesses (such as human instinct, curiosity, trust, greed) and loopholes in the rules and regulations through natural, social and institutional ways to create a relationship between the attacker and the attacked. Establish a trust relationship between users and obtain valuable information, so that some sensitive data and private data can be accessed through paths that are not authorized by the user. With the popularization of computers and the continuous development of Internet technology, as a means of attack, the technology of social engineering is becoming more and more mature. Using social engineering to conduct network attacks can enable network attackers to achieve what they want without paying a high price, so ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 吴桐郑康锋武斌张冬梅李雪
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products