Unlock instant, AI-driven research and patent intelligence for your innovation.

Social engineering interaction method, device and storage medium

An interaction method and technology of an interaction device are applied in the fields of cyberspace security, social engineering, and computer technology, and can solve problems such as inability to meet detection, poor flexibility, and single application.

Active Publication Date: 2021-08-31
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current attack detection method has a single application and poor flexibility. For example, in terms of detection methods for phishing emails and phishing websites, two different detection methods are required, and there is a lack of detection of social engineering attacks in the form of direct dialogue, so it cannot meet the requirements for Detection of complex, intersecting social engineering attacks such as conversational

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social engineering interaction method, device and storage medium
  • Social engineering interaction method, device and storage medium
  • Social engineering interaction method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0036] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the structures and / or processing steps closely related to the solution according to the present invention are shown in the drawings, and the related Other details are not relevant to the invention.

[0037] It should be emphasized that the term "comprising / comprising" when used herein refers to the presence of a feature, element, step or component, but does not exclude the presence or addition of one or more other features, elements, steps or components.

[0038] Here, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a social engineering interaction method, device and storage medium, the method comprising the following steps: monitoring and recording conversation messages between network users and monitoring end users from a social platform; identifying session identity authentication based on the monitored conversation messages state; identify the scene forgery status of the session based on the monitored session message and preset forged scene data; identify the attack implementation status of the session based on the monitored session message and preset sensitive operation data; when the scene forgery status is identified When the attack implementation status is identified later, the attack processing is carried out using the sandbox mechanism; if the attack implementation status is not recognized after the scene forgery status is identified, the forged scene in the identified scene forgery status uses the pre-established The attack induction mechanism of the network user sends an attack induction response message to interact with the network user until the session ends or the attack implementation status is identified.

Description

technical field [0001] The present invention relates to the fields of computer technology, network space security and social engineering, and more specifically relates to a social engineering interaction method, device and storage medium. Background technique [0002] At present, research on social engineering mainly focuses on attack model understanding, personality vulnerability analysis, attack detection, defense, etc. Although many attack models have been proposed, they are theoretically the extension and improvement of Kevin Mitnick's attack model. For example, the existing literature divides a social engineering attack into 8 stages: 1) collect information; 2) Determining strategy; 3) Using psychological factors; 4) Approaching the victim; 5) Role-playing; 6) Trust building; 7) Waiting for an opportunity; sex. [0003] Nowadays, there are endless researches on the detection of social engineering attacks, starting from two aspects of people and technology, mainly divi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/1466H04L63/1491H04L51/52
Inventor 郑康锋武斌伍淳华张冬梅李雪
Owner BEIJING UNIV OF POSTS & TELECOMM