User vulnerability analysis method oriented to social engineering attack

An analysis method and engineering technology, applied in neural learning methods, instruments, biological neural network models, etc., can solve problems such as difficult to meet the needs of network confrontation and low efficiency of attack methods

Pending Publication Date: 2021-12-10
HANGZHOU DIANZI UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there is no user vulnerability analysis method for social engineering attacks, and the attack method is inefficient, and it is difficult to meet the needs of network confrontation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User vulnerability analysis method oriented to social engineering attack
  • User vulnerability analysis method oriented to social engineering attack
  • User vulnerability analysis method oriented to social engineering attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0056] Such as figure 1 As shown, a user vulnerability analysis method for social engineering attacks, the steps are:

[0057] Step (1) Based on the content of the microblog album, the image classification algorithm is used to divide the images in the album into four categories: people, scenery, animals and animation, and the feature vector F of the microblog album is constructed by combining statistical methods 1 ;

[0058] Step (2) Perform face positioning on the person image, extract the face image, perform facial emotion recognition on the face image, obtain the emotional sequence of each user according to the time sequence of the image, and construct the image by combining the emotional t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user vulnerability analysis method oriented to social engineering attacks. At present, a user vulnerability analysis method oriented to social engineering attacks does not appear yet. The method comprises the following steps: firstly, dividing images in a microblog album into four categories of figures, sceneries, animals and cartoons, and constructing microblog album feature vectors in combination with a statistical method; performing face positioning on a figure image, extracting a face image, performing face emotion recognition, and constructing an image emotion feature vector; then obtaining microblog content of a user for sentiment classification, and constructing sentiment sequence features; and finally, combining a user feature matrix and an attention state between users to construct a network graph with features, and labeling vulnerability labels for all the users through a graph network model. A vulnerability classifier is obtained through training according to the user features and the corresponding labels. According to the method, the vulnerability of the user and whether the user belongs to an object easy to carry out social engineering attacks can be accurately judged, and a foundation is laid for subsequent social engineering research.

Description

technical field [0001] The invention belongs to the field of computer application and Internet technology, and in particular relates to a user vulnerability analysis method facing social engineering attacks. Background technique [0002] With the rapid development of Internet technology in the 21st century, users can publish information through social platforms in various ways. They can use text messages, emails, real-time software and web pages to publish their own edited information. Data associated with personal privacy. Social engineering (Social Engineering) is to fully apply the research method on objects to the research on people, and turn it into a tool for technical control. Social engineering is a method that aims at victims' psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed, and implements harm such as deception and harm. "Social engineering attack" is to use people's psychological characteristics to deceive...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06K9/00G06N3/04G06N3/08
CPCG06N3/08G06N3/047G06N3/045G06F18/2155G06F18/24323G06F18/2415G06F18/253
Inventor 徐向华袁炜祺王然
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products