Unlock instant, AI-driven research and patent intelligence for your innovation.

Social engineering interaction method and device and storage medium

An interaction method and technology of an interaction device are applied in the fields of cyberspace security, social engineering, and computer technology, and can solve problems such as single application, lack of social engineering attack detection, and poor flexibility.

Active Publication Date: 2021-02-23
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current attack detection method has a single application and poor flexibility. For example, in terms of detection methods for phishing emails and phishing websites, two different detection methods are required, and there is a lack of detection of social engineering attacks in the form of direct dialogue, so it cannot meet the requirements for Detection of complex, intersecting social engineering attacks such as conversational

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social engineering interaction method and device and storage medium
  • Social engineering interaction method and device and storage medium
  • Social engineering interaction method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0036] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the structures and / or processing steps closely related to the solution according to the present invention are shown in the drawings, and the related Other details are not relevant to the invention.

[0037] It should be emphasized that the term "comprising / comprising" when used herein refers to the presence of a feature, element, step or component, but does not exclude the presence or addition of one or more other features, elements, steps or components.

[0038] Here, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a social engineering interaction method and device, and a storage medium. The method comprises the following steps: monitoring and recording a session message between a networkuser and a monitoring end user from a social platform; identifying an identity authentication state of the session based on the monitored session message; identifying a scene counterfeiting state of the session based on the monitored session message and preset counterfeiting scene data; identifying an attack implementation state of the session based on the monitored session message and preset sensitive operation data; under the condition that the scene counterfeiting state is identified and the attack implementation state is identified, performing attack processing by adopting a sandbox mechanism; and under the condition that the attack implementation state is not identified after the scene counterfeiting state is identified, sending an attack induction response message to a network user by utilizing a pre-established attack induction mechanism based on the counterfeiting scene in the identified scene counterfeiting state, so as to interact with the network user until the session is ended or the attack implementation state is identified.

Description

technical field [0001] The present invention relates to the fields of computer technology, network space security and social engineering, and more specifically relates to a social engineering interaction method, device and storage medium. Background technique [0002] At present, research on social engineering mainly focuses on attack model understanding, personality vulnerability analysis, attack detection, defense, etc. Although many attack models have been proposed, they are theoretically the extension and improvement of Kevin Mitnick's attack model. For example, the existing literature divides a social engineering attack into 8 stages: 1) collect information; 2) Determining strategy; 3) Using psychological factors; 4) Approaching the victim; 5) Role-playing; 6) Trust building; 7) Waiting for an opportunity; sex. [0003] Nowadays, there are endless researches on the detection of social engineering attacks, starting from two aspects of people and technology, mainly divi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/1466H04L63/1491H04L51/52
Inventor 郑康锋武斌伍淳华张冬梅李雪
Owner BEIJING UNIV OF POSTS & TELECOMM