Method for assessing the risk of user compromise based on individual security profile
Article Sidebar
Issue Vol. 16 No. 1 (2026)
-
Efficient CNN-based classification of white blood cells: a comparative study of model performance
Achraf Benba, Sara Sandabad5-9
-
Automated skin cancer diagnosis using deep learning: a systematic review of state-of-the-art architectures, techniques and performance evaluation
Subaidabeevi Shafeena, Ramayyan Sumathy Vinod Kumar, Sikamony Sumathi Kumar, David Shahi10-20
-
Enhancing driver safety with ECG-based emotion recognition using BiLSTM networks
Raga Madhuri Chandra, Satya Sumanth Vanapalli, Giri Venkata Sai Tej Neelaiahgari21-28
-
An automated system for calibration table calculation of cylindrical horizontal tanks
Denis Proskurenko, Mykhailo Bezuglyi29-34
-
Control of water–diesel emulsion stability using turbidity measurements
Oleksandr Zabolotnyi, Andrii Khodieiev, Nicolay Koshevoy, Roman Trishch35-41
-
Improving the induction motor starting mode under a voltage drop conditions
Oleksandr Vovk, Serhii Halko, Andrii Sabo, Oleksandr Miroshnyk, Taras Shchur42-47
-
Modelling of dynamic modes in a DC motor for electric vehicle
Viktor Lyshuk, Anatolii Tkachuk, Sergiy Moroz, Mykola Yevsiuk, Mykola Khvyshchun, Stanislav Prystupa, Valentyn Zablotskyi48-55
-
Development and analysis of power grid failure scenarios using ontology, power flow model, and knowledge graph
Oleksandr Khomenko, Vyacheslav Senchenko, Oleksandr Koval, Iryna Husyeva56-61
-
Kinetics of grain material drying in installations with intermittent energy supply by microwave and infrared radiation
Roman Kalinichenko, Valentyna Bandura, Borys Kotov, Yurii Pantsyr, Ihor Garasymchuk, Serhii Stepanenko62-66
-
Smartphone shell temperature controller automatic tuning method
Danylo Zinchenko, Yurii Mariiash67-71
-
Using FPGA for modelling and generating chaotic processes
Oleksandr Osadchuk, Iaroslav Osadchuk, Valentyn Skoshchuk72-77
-
Simulation and electronic design of a chaotic 5d artificial neural network
Michael Kopp, Inna Samuilik78-83
-
Intelligent DL-SCH/PDSCH processing chain in 5G with adaptive HARQ mechanism
Juliy Boiko, Ilya Pyatin84-93
-
Exploring generative models for remote sensing: a comprehensive review
Gottapu Santosh Kumar, Gurugubelli Jagadeesh, Swarajya Madhuri Rayavarapu94-98
-
Ensemble noise-aided bit flipping decoding of low-density parity-check codes
Mykola Shtompel, Oleksandr Shefer99-103
-
Knowledge sharing in Independent Deep Q-Network
Viacheslav Bochok, Nataliia Fedorova104-108
-
Detection of humans in drone images using deep learning techniques
Sobhana Mummaneni, Naga Deepika Ginjupalli, Pragathi Dodda, Novaline Jacob, Sanjay Raj Emmanuel Katari109-115
-
Comparative analysis of DeepSORT, ByteTrack and StrongSORT algorithms for multi-object tracking in UAV-based video surveillance
Andrii Safonyk, Viktor Podvyshennyi, Oleksandr Naumchuk116-120
-
Highly efficient approaches to processing complex visual data in decision support systems
Oleksandr Poplavskyi, Sergii Pavlov, Oksana Bezsmernta, Iryna Gerasymova, Bakhyt Yeraliyeva121-125
-
Anti-aliasing method for second-order curves on a hexagonal raster
Oleksandr Melnyk, Tetiana Prysiazhniuk126-129
-
Method for assessing the risk of user compromise based on individual security profile
Svitlana Lehominova, Mykhailo Zaporozhchenko, Tetiana Kapeliushna, Yuriy Shchavinsky, Tetiana Muzhanova130-137
-
Positional coding method in differential wave space
Volodymyr Barannik, Anatolii Berchanov, Valeriy Barannik, Dmytro Uzlov, Mykola Dihtiar, Mykhailo Osovytskyi, Andrii Sushko, Yurii Babenko138-146
-
Web platform with Checkbox support: aspects of fiscal accounting, reporting, and interaction with tax authorities
Yuliia Povstiana, Lyudmila Samchuk, Ivan Kachula147-154
-
Comparative analysis of web development frameworks in PHP: Codeigniter, Cakephp and Yii
Karol Rak, Mariusz Dzieńkowski155-161
-
Crop price forecasting using a Temporal Fusion Transformer for Krishna district of Andhra Pradesh
Dedeepya Manikonda, Ashutosh Satapathy, Keerthi Padamata, Jaswanthi Machcha, J. Chandrakanta Badajena162-170
-
Model of packet transmission of text data using SDR in the GNU Radio Companion environment
Nurbol Kaliaskarov, Kyrmyzy Taissariyeva, Nurlykhan Raulyev, Akezhan Sabibolda171-176
-
Modelling of a pull-flow production system with dynamic buffer stock control
Saad Elbaraka, Salah-eddine Mokhlis, Adil Barra, Hicham Fouraiji, Mohamed Rhouzali, Najat Messaoudi177-182
Archives
-
Vol. 16 No. 1
2026-03-30 27
-
Vol. 15 No. 4
2025-12-20 27
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
Main Article Content
DOI
Authors
Abstract
This article presents a method for assessing the risk of user compromise in corporate information systems caused by social engineering cyberattacks. The approach integrates an evaluation of the individual security profile of each user – based on psychological, organizational, technical, and information influence factors – with graph-based modelling of internal interactions within the organization. Unlike most existing methods that focus solely on isolated user characteristics or assume a single-stage (direct) cyberattack scenario, the proposed method accounts for the propagation of cyberattacks through multi-stage trajectories in communication networks. A formalized four-phase model of social engineering cyberattack implementation is developed, with each phase described as a function of interacting factors. Conditional probabilities are estimated using dynamic coefficients that reflect both the base value and the contextual impact of modifying factors. A graph-based procedure is introduced to calculate the probability of multi-stage compromise based on the structure and intensity of user interactions (e.g., project participation, communication frequency, hierarchical relationships, and shared access to information assets). The proposed method was validated through individual user security profiling, followed by scenario-based modeling of multi-stage social engineering attack propagation on a representative subset. Results show that users with strong individual protection can remain vulnerable due to their position in critical communication chains. The visualization of trajectories exceeding a defined probability threshold supports the identification of high-risk paths and intermediary nodes that require prioritized protection measures. The main scientific contribution lies in combining individualized risk assessment with system-level propagation modelling using interpretable and adaptable mathematical constructs. The method does not require large volumes of empirical data, which ensures its practical applicability even in conditions of limited access to internal information. Future research will focus on automating data collection for factor assessment, adapting the model for real-time operation, and extending it through advanced modelling of behavioral attack scenarios.
Keywords:
References
[1] Abdollahbeigi, B., & Salehi, F. (2019). The Effect of External Environment Characteristics on Effective IT Governance through Organizational Performance. Journal of Technology Management and Technopreneurship (JTMT), 7(1), 19–28. https://jtmt.utem.edu.my/jtmt/article/view/5566
[2] Aijaz, M., & Nazir, M. (2024). Modelling and analysis of social engineering threats using the attack tree and the Markov model. International Journal of Information Technology, 16(2), 1231–1238. https://doi.org/10.1007/s41870-023-01540-z DOI: https://doi.org/10.1007/s41870-023-01540-z
[3] Albladi, S. M., & Weir, G. R. S. (2018). User characteristics that influence judgment of social engineering attacks in social networks. Human-Centric Computing and Information Sciences, 8(1), 5. https://doi.org/10.1186/s13673-018-0128-7 DOI: https://doi.org/10.1186/s13673-018-0128-7
[4] Albladi, S. M., & Weir, G. R. S. (2019). A Conceptual Model to Predict Social Engineering Victims. 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), 212–212. https://doi.org/10.1109/ICGS3.2019.8688352 DOI: https://doi.org/10.1109/ICGS3.2019.8688352
[5] Albladi, S. M., & Weir, G. R. S. (2020). Predicting individuals’ vulnerability to social engineering in social networks. Cybersecurity, 3(1), 7. https://doi.org/10.1186/s42400-020-00047-5 DOI: https://doi.org/10.1186/s42400-020-00047-5
[6] Beckers, K., Krautsevich, L., & Yautsiukhin, A. (2015). Using Attack Graphs to Analyze Social Engineering Threats: International Journal of Secure Software Engineering, 6(2), 47–69. https://doi.org/10.4018/IJSSE.2015040103 DOI: https://doi.org/10.4018/IJSSE.2015040103
[7] Bohonko, O., & Lysenko, S. (2023). Social engineering attacks detection approach. Herald of Khmelnytskyi National University. Technical Sciences, 327(5(2), 231-236. https://doi.org/10.31891/2307-5732-2023-327-5-231-236 DOI: https://doi.org/10.31891/2307-5732-2023-327-5-231-236
[8] Cletus, A., Weyory, B., & Opoku, A. (2022). Improving Social Engineering Awareness, Training and Education (SEATE) using a Behavioral Change Model. International Journal of Advanced Computer Science and Applications, 13(5). https://doi.org/10.14569/IJACSA.2022.0130572 DOI: https://doi.org/10.14569/IJACSA.2022.0130572
[9] Fakhouri, H. N., Alhadidi, B., Omar, K., Makhadmeh, S. N., Hamad, F., & Halalsheh, N. Z. (2024). AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response. 2024 2nd International Conference on Cyber Resilience (ICCR), 1–8. https://doi.org/10.1109/ICCR61006.2024.10533010 DOI: https://doi.org/10.1109/ICCR61006.2024.10533010
[10] Huseynov, F., & Ozdenizci Kose, B. (2024). Using machine learning algorithms to predict individuals’ tendency to be victim of social engineering attacks. Information Development, 40(2), 298–318. https://doi.org/10.1177/02666669221116336 DOI: https://doi.org/10.1177/02666669221116336
[11] Lopes, A., Mamede, H. S., Reis, L., & Santos, A. (2024). Common Techniques, Success Attack Factors and Obstacles to Social Engineering: A Systematic Literature Review. Emerging Science Journal, 8(2), 761–794. https://doi.org/10.28991/ESJ-2024-08-02-025 DOI: https://doi.org/10.28991/ESJ-2024-08-02-025
[12] Wang, Z., Sun, L., & Zhu, H. (2020). Defining Social Engineering in Cybersecurity. IEEE Access, 8, 85094–85115. https://doi.org/10.1109/ACCESS.2020.2992807 DOI: https://doi.org/10.1109/ACCESS.2020.2992807
[13] Ye, Z., Guo, Y., Ju, A., Wei, F., Zhang, R., & Ma, J. (2020). A Risk Analysis Framework for Social Engineering Attack Based on User Profiling: Journal of Organizational and End User Computing, 32(3), 37–49. https://doi.org/10.4018/JOEUC.2020070104 DOI: https://doi.org/10.4018/JOEUC.2020070104
[14] 2024 Data breach investigations report. Verizon Business, https://www.verizon.com/business/en-gb/resources/reports/2024/dbir/2024-dbir-data-breach-investigations-report.pdf
[15] Cost of data breach report 2024. IBM Corporation. https://table.media/wp-content/uploads/2024/07/30132828/Cost-of-a-Data-Breach-Report-2024.pdf
Article Details
Abstract views: 6

