{"title":"基于双因素认证(2fa)的短信系统","authors":"S. Slamet","doi":"10.53567/spirit.v14i2.260","DOIUrl":null,"url":null,"abstract":"Advances in digital technology have made communication between humans faster and easier. On the other hand, a lot of personal information is available online through social media and services that do not have security measures in place to protect this information. Therefore, the communication system is very vulnerable and easily penetrated by intruder due to social engineering attacks. This attack aims to deceive individuals or companies by taking actions that benefit the attacker. The trick is to provide personal data such as PIN numbers, health records, and passwords. This attack phenomenon is one of the biggest challenges in maintaining the security of personal data because this attack model takes advantage of human nature which is easy to trust others. This paper provides an in-depth survey of high-success social engineering attacks, using a 2 Factor Authentication (2FA) model by examining user accounts, to detect and avoid attempted account fraud via SMS (Short Message System). Experimental results show that attack success can be reduced to 10% and aggressive intruders can be caught by 70% of users in forwarding user verification code.","PeriodicalId":32386,"journal":{"name":"The Spirit of Society Journal International Journal of Society Development and Engagement","volume":"6 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"PERTAHANAN PENCEGAHAN SERANGAN SOCIAL ENGINEERING MENGGUNAKAN TWO FACTOR AUTHENTICATION (2FA) BERBASIS SMS (SHORT MESSAGE SYSTEM)\",\"authors\":\"S. Slamet\",\"doi\":\"10.53567/spirit.v14i2.260\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advances in digital technology have made communication between humans faster and easier. On the other hand, a lot of personal information is available online through social media and services that do not have security measures in place to protect this information. Therefore, the communication system is very vulnerable and easily penetrated by intruder due to social engineering attacks. This attack aims to deceive individuals or companies by taking actions that benefit the attacker. The trick is to provide personal data such as PIN numbers, health records, and passwords. This attack phenomenon is one of the biggest challenges in maintaining the security of personal data because this attack model takes advantage of human nature which is easy to trust others. This paper provides an in-depth survey of high-success social engineering attacks, using a 2 Factor Authentication (2FA) model by examining user accounts, to detect and avoid attempted account fraud via SMS (Short Message System). Experimental results show that attack success can be reduced to 10% and aggressive intruders can be caught by 70% of users in forwarding user verification code.\",\"PeriodicalId\":32386,\"journal\":{\"name\":\"The Spirit of Society Journal International Journal of Society Development and Engagement\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Spirit of Society Journal International Journal of Society Development and Engagement\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.53567/spirit.v14i2.260\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Spirit of Society Journal International Journal of Society Development and Engagement","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53567/spirit.v14i2.260","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

数字技术的进步使人与人之间的交流更快、更容易。另一方面,很多个人信息是通过社交媒体和没有安全措施来保护这些信息的服务在网上提供的。因此,由于社会工程攻击,通信系统非常脆弱,容易被入侵者渗透。这种攻击的目的是通过采取有利于攻击者的行动来欺骗个人或公司。诀窍是提供个人数据,如PIN号码、健康记录和密码。这种攻击现象是维护个人数据安全的最大挑战之一,因为这种攻击模式利用了人类容易信任他人的本性。本文提供了一个深入的调查高成功的社会工程攻击,使用2因素身份验证(2FA)模型,通过检查用户帐户,以检测和避免试图通过SMS(短消息系统)帐户欺诈。实验结果表明,转发用户验证码可以将攻击成功率降低到10%,70%的用户可以捕获攻击性入侵者。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
PERTAHANAN PENCEGAHAN SERANGAN SOCIAL ENGINEERING MENGGUNAKAN TWO FACTOR AUTHENTICATION (2FA) BERBASIS SMS (SHORT MESSAGE SYSTEM)
Advances in digital technology have made communication between humans faster and easier. On the other hand, a lot of personal information is available online through social media and services that do not have security measures in place to protect this information. Therefore, the communication system is very vulnerable and easily penetrated by intruder due to social engineering attacks. This attack aims to deceive individuals or companies by taking actions that benefit the attacker. The trick is to provide personal data such as PIN numbers, health records, and passwords. This attack phenomenon is one of the biggest challenges in maintaining the security of personal data because this attack model takes advantage of human nature which is easy to trust others. This paper provides an in-depth survey of high-success social engineering attacks, using a 2 Factor Authentication (2FA) model by examining user accounts, to detect and avoid attempted account fraud via SMS (Short Message System). Experimental results show that attack success can be reduced to 10% and aggressive intruders can be caught by 70% of users in forwarding user verification code.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
5 weeks
期刊最新文献
RANCANG BANGUN APLIKASI PENGADAAN BARANG DISTRIBUSI PADA PT FAMOUS CHICKEN DENGAN MENGGUNAKAN METODE DISTRIBUTOR REQUIREMENT PLANNING (DRP) IMPELEMTASI TEKNOLOGI 3D AUGMENTED REALITY UNTUK PEMETAAN GEDUNG SMK YADIKA BANGIL SISTEM PENDUKUNG KEPUTUSAN CALON PENERIMA DANA BANTUAN SISWA MISKIN (BSM) MENGGUNAKAN METODE MULTI-OBJECTIVE OPTIMAZION ON THE BASIS OF RATIO ANALYSIS Implementasi Metode K-Nearest Neighbor dalam Mengklasifikasikan Kesegaran Ikan Kuro Menggunakan Citra PENGEMBANGAN DATA RECORD PASIEN DENGAN METODE JOINT APPLICATION DEVELOPMENT (Studi kasus KLINIK ALFIZA MEDIKA UTAMA)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1