Use of Interpersonal Deception Theory in Counter Social Engineering

Grace Hui Yang, Yue Yu
2018 International Conference on Information and Knowledge Management  
Social engineering attacks exploit human vulnerabilities rather than computer vulnerabilities. Ranging from straightforward spam emails to sophisticated context-aware social engineering, social engineering has demonstrated rich varieties. Surprisingly, even the simplest type of attacks are able to fool numerous innocent people. The more sophisticated ones are even more "successful" in achieving their malicious purposes. In order to mitigate and combat these attacks, we need better automated
more » ... ter social engineering algorithms and tools. In this position paper, we propose a reinforcement learning framework that incorporates interpersonal deception theory to fight against social engineering attacks on social media sites.
dblp:conf/cikm/YangY18 fatcat:foj7z6tvn5dnnghwydumb6cbcq