Unlock instant, AI-driven research and patent intelligence for your innovation.

Social Engineering Attack Threats, Events, Scenario Analysis Methods, Devices, and Systems

An analysis method and attack scenario technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of social engineering attacks, dependence, and lack of knowledge models that cannot cover other types of

Active Publication Date: 2022-04-08
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing technologies for social engineering threat analysis are only applicable to individual social engineering attack types, such as phishing emails, and cannot cover other types of social engineering attacks, and lack a general social engineering attack analysis framework
For social engineering attacks that cover different types of attacks and have various variants, the existing analysis still mainly relies on human understanding, lacking a structured, machine-readable knowledge model that can be used to analyze social engineering attacks at a fine-grained level; at the same time, the existing The social engineering attack analysis scheme also has deficiencies in the following aspects, such as the segmentation and correlation analysis of different types of social engineering elements, the identification of high-risk elements, the discovery of potential threats and weak links, and the analysis process and results. visual display etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social Engineering Attack Threats, Events, Scenario Analysis Methods, Devices, and Systems
  • Social Engineering Attack Threats, Events, Scenario Analysis Methods, Devices, and Systems
  • Social Engineering Attack Threats, Events, Scenario Analysis Methods, Devices, and Systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention. The method for analyzing social engineering attack threats, events, and scenarios provided by the present invention will be explained and described in detail below through specific embodiments.

[0051] figure 1 A schematic flow diagram of a social engineering attack threat, event, and scene analysis method provided by an embodiment of the present invention; figure 1 As...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a social worker attack threat, event, scene analysis method, device and system, including: building a social worker domain ontology; building a social worker knowledge graph based on the social worker domain ontology; and performing social worker attack threats and events based on the social worker knowledge graph , Scene analysis. The present invention provides a general analysis framework for different types of social engineering attacks, and provides a formalized, machine-readable, clear, and shareable knowledge schema for the social engineering field; it can synthesize social engineering attack threat elements , Correlation analysis, providing a new way for the understanding, analysis, perception, discovery, defense, etc. of known and unknown social engineering attacks, threats, events, scenarios, etc. For example, it can analyze the fine-grained components of not less than 11 components of social engineering attacks, analyze and identify high-risk attack threat elements and weak links, find potential attackers, attack targets, and attack paths, analyze and find homologous social engineering attacks, etc. .

Description

technical field [0001] The present invention relates to the technical field of cyberspace security, in particular to a social engineering attack threat, event, and scene analysis method, device, and system. Background technique [0002] Social engineering attacks have the characteristics of simplicity, flexibility, bypassability, and scalability. The types and forms of social engineering attacks are very diverse. Compared with traditional network attacks that exploit the vulnerability of software and hardware, social engineering attacks focus on the use of human factors to achieve attack goals. Attackers no longer need to brute force crack passwords day and night, develop attack scripts in depth, break through firewalls, and fight against anti-virus software. The implementation of social engineering attacks may be very simple. The attacker only needs to pretend to be an insider to make a phone call to obtain the desired information; it may also be very complicated. penetrat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06Q50/26G06Q50/00G06F16/36
CPCH04L63/1416H04L63/1441H04L63/1433H04L63/20G06F16/367G06Q50/01G06Q50/265
Inventor 于楠王作广黄文军朱红松孙利民
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI