본문 바로가기
  • Home

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2018, 23(11), pp.75-84
  • DOI : 10.9708/jksci.2018.23.11.075
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science
  • Received : August 30, 2018
  • Accepted : October 22, 2018
  • Published : November 30, 2018

Kim Jun Seok 1 Hyunjae Kang 1 Jinsoo Kim 2 Huy-Kang Kim 1

1고려대학교
2국방과학연구소

Accredited

ABSTRACT

Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

Citation status

* References for papers published after 2022 are currently being built.