• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Yang, R. (Yang, R..) | Zheng, K. (Zheng, K..) | Wang, X. (Wang, X..) | Wu, B. (Wu, B..) | Wu, C. (Wu, C..)

Indexed by:

Scopus

Abstract:

Social engineering attacks are considered one of themost hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid decisions. This paper proposes a multiattribute quantitative incentive method based on human vulnerability and an improved Q-learning (IQL) reinforcement learning method on human vulnerability attributes. The proposed algorithm aims to address the two main challenges in social engineering attack defense by using a multiattribute incentive method based on human vulnerability to determine the optimal defense strategy. Furthermore, the IQL reinforcement learning method facilitates rapid decision-making during real-time attacks. The experimental results demonstrate that the proposed algorithm outperforms the traditional Qlearning (QL) and deep Q-network (DQN) approaches in terms of time efficiency, taking 9.1% and 19.4% less time, respectively. Moreover, the proposed algorithm effectively addresses the non-uniformity of vulnerabilities in social engineering attacks and provides a reliable defense strategy based on human vulnerability attributes. This study contributes to advancing social engineering attack defense by introducing an effective and efficient method for addressing the vulnerabilities of human factors in the cybersecurity domain. © 2023 CRL Publishing. All rights reserved.

Keyword:

Q-learning Social engineering game theory reinforcement learning

Author Community:

  • [ 1 ] [Yang R.]School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China
  • [ 2 ] [Zheng K.]School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China
  • [ 3 ] [Wang X.]School of Computer Science, Beijing University of Technology, Beijing, 100124, China
  • [ 4 ] [Wu B.]School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China
  • [ 5 ] [Wu C.]School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Source :

Computer Systems Science and Engineering

ISSN: 0267-6192

Year: 2023

Issue: 2

Volume: 47

Page: 2153-2170

2 . 2 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:19

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 2

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:546/10648202
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.