A dual integrated dynamic intrusion detection system (DID-IDS) for protection against network and social engineering attacks

Abubakar Bello, Hany Alashwal, Ahmed A Moustafa

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Cybercriminals can attack either network systems (using password attacks, IP address spoofing, or traffic interception methods) or attack the minds of computer system users (using social engineering techniques). There have been only a few studies on developing detection systems against social engineering, as most anomaly and intrusion detection methods focus only on hindering computer system attacks. Throughout this article, we refer to these attacks as standard cyber vs. social engineering attacks. To increase cyber and network security, this position paper argues that governments, firms, and organizations should develop and use a dual integrated dynamic intrusion detection system (DID-IDS) to detect computer hacking as well as social engineering attacks. Using this integrated system approach, the detection of social engineering attacks will alert the computer system attack detection system to increase its threshold to safeguard IT systems against potential attacks. Here, we describe the benefits of using this integrated system, including its implications for information security.

Original languageEnglish
Title of host publicationCybersecurity and Cognitive Science
EditorsAhmed A. Moustafa
Place of PublicationAmsterdam
PublisherElsevier
Pages43-49
Number of pages7
ISBN (Electronic)9780323905701
ISBN (Print)9780323906968
DOIs
Publication statusPublished - 1 Jan 2022

Keywords

  • Cyber security
  • Dual integrated systems
  • Dynamic threshold
  • Intrusion detection
  • Social engineering

Fingerprint

Dive into the research topics of 'A dual integrated dynamic intrusion detection system (DID-IDS) for protection against network and social engineering attacks'. Together they form a unique fingerprint.

Cite this