
Anastasia KhlobystovaSaint Petersburg State University | SPBU · Department of Computer Science
Anastasia Khlobystova
Magister
About
14
Publications
315
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
40
Citations
Citations since 2017
Introduction
Skills and Expertise
Additional affiliations
March 2019 - present
St. Petersburg Federal Research Center of the Russian Academy of Sciences
Position
- junior research
Publications
Publications (14)
The subject of the research is the predictors of the intensity of interaction between users in online social networks, which can be formalized in probability estimate of the spread of multistep social engineering attacks. The research methodology is based on comparing, using the methods of statistical analysis, the observed online interaction of us...
Multistep social engineering attacks (that involve a chain of users) are a serious threat to an organization’s information security. Usually such attacks require an integrated approach to reduce the probability of their success. This approach can be analysis of the social graph with modeling of scenarios for the spread of multistep social engineeri...
The purpose of this study is to propose approaches to validation of quantification of variable “relationship between users” in the context of social engineering attacks, as well as consideration of the accuracy of the proposed model, correlativity checks of used in research formulations and desired characteristics and other conditions necessary for...
This article proposes a mathematical model that helps to track a player’s game actions and present them in a structured form. The gaming process is presented as a set of states that are connected by a player’s actions. Each state is a set of predicates that characterize the player’s knowledge about the game. This mathematical model was developed as...
In this research we present the hybrid model of finding the most critical distribution trajectories of multipath Social engineering attacks, passing through which by the malefactor on a global basis has the topmost degree of probability and will bring the greatest loss to the company. The solution of search problem concerning the most critical traj...
The goal of this article is to propose an approach to linguistic values quantification and to consider an example of its application to the relationship types between users in the popular social network in Russia “VK”. To achieve this aim, we used the results of a sociological survey, by which were found the frequency of the order, then the probabi...
The purpose of this article is to propose an approach to denoting the parameters of the model for assessing the probability of success of a multi-pass social engineering attack of an attacker on a user. These parameters characterize the evaluation of the probability of propagation of social engineering attacks from user to user in one type of inter...
In this article we propose to consider the trajectories of social engineering attacks, which are the most critical from the point of view of the expected damage to the organization, and not from the point of view of the probability of success of the defeat of the user and, indirectly, critical documents to which he has access. The article proposes...
Introduction: Social engineering attacks can be divided into two types: direct (one-way) and multi-pass ones, passing through a chain of users. Normally, there are several propagation paths for a multi-pass social engineering attack between two users. Estimates of the probabilities of an attack to spread along different trajectories will differ. Pu...