<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A method for synthesising system architecture for IT infrastructure resistant to social engineering attacks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergii Lysenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Bokhonko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomas Sochor</string-name>
          <email>tomas.sochor@eruni.org</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olha Atamaniuk</string-name>
          <email>olhaatamaniuk12@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nadiia Lysenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jiri Balej</string-name>
          <email>jiri.balej@mendelu.cz</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>European Research University</institution>
          ,
          <addr-line>Ostrava</addr-line>
          ,
          <country country="CZ">Czech Republic</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Khmelnytsky National University</institution>
          ,
          <addr-line>Instytutska street 11, 29016, Khmelnitsky</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Mendel University in Brno</institution>
          ,
          <addr-line>1665/1, Zemědělská, Brno, 613 00</addr-line>
          ,
          <country country="CZ">Czech Republic</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>The primary purpose of this study is to develop a robust method for synthesizing IT infrastructure architecture resilient to social engineering attacks, addressing the critical vulnerability of the human factor in cybersecurity. Current detection mechanisms, ranging from rule-based filters to standard machine learning models, often fail to adapt to personalized attack strategies and sufer from high false-positive rates, creating a significant gap in efective defense. In this work, we propose a hierarchical multi-agent system that decouples high-level decision-making from modality-specific evidence gathering, utilizing reinforcement learning guided by entropy reduction and knowledge-graph priors to coordinate specialized agents for email and web content. Experimental results on a combined corpus of 80,000 samples demonstrate that the proposed architecture achieves an Area Under the ROC Curve of 0.96 and an F1-score of 0.92, significantly outperforming single-agent baselines while reducing the false-positive rate at a 95% true-positive rate to 0.08 and cutting the number of actions per sample by 47%. We conclude that this principled coordination of specialized agents ofers a scalable and eficient path to engineering adaptable, multi-level defenses that maintain high accuracy and low latency against evolving social engineering threats.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Distributed systems</kwd>
        <kwd>social engineering</kwd>
        <kwd>computer systems</kwd>
        <kwd>machine learning</kwd>
        <kwd>multi-agent systems</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The increasing reliance on digital communication and online services has been accompanied by a
steady rise in social engineering attacks. Unlike purely technical exploits, these attacks target human
behavior, exploiting trust and psychological manipulation to gain unauthorized access to information
of IT infrastructure. Common techniques, such as phishing, pretexting, and baiting, are frequently used
as entry points for more complex intrusions, including ransomware infections and advanced persistent
threats [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ].
      </p>
      <p>
        Conventional security measures, including firewalls and intrusion detection systems, are efective
against technical vulnerabilities but provide limited protection when the human factor is exploited.
This has made the detection and prevention of social engineering attempts a pressing issue for both
practitioners and researchers in the cybersecurity field [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Efective solutions require a multidisciplinary
approach that combines technical defenses with behavioral and contextual analysis [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>
        Current research eforts have produced a range of detection methods, from simple rule-based filters
to models employing natural language processing and machine learning [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. While these tools have
demonstrated promise, many struggle to adapt to new or highly personalized attack strategies and
often sufer from issues such as high false positive rates. These shortcomings highlight the need for
more sophisticated and adaptive approaches [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ].
      </p>
      <p>The proposed approach is intended to build the an eficient method for synthesising system
architecture for IT infrastructure resistant to social engineering attacks, which will be able to improve the
accuracy and adaptability of social engineering detection while maintaining usability for end users.
The results presented here contribute to the broader efort to develop reliable defenses against one of
the most persistent and dificult-to-detect threats in modern cybersecurity.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>A significant body of research has focused on improving the detection of social engineering and intrusion
attempts by leveraging multi-agent systems, multimodality, and federated learning paradigms. Recent
studies highlight diverse approaches that combine technical feature extraction, behavioral analysis, and
adaptive architectures to enhance detection accuracy while ensuring robustness and scalability.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], the authors propose PhishDebate, a modular framework where specialized agents
independently analyze diferent layers of a webpage (URL, HTML, semantic content, brand imitation signals).
Their outputs are consolidated through a debate-style interaction involving Moderator and Judge
roles. This structure reduces the risk of single-channel errors while improving interpretability through
structured arguments. The debate process forces agents to reconcile contradictions (e.g., legitimate
semantics vs. suspicious domains), resulting in high completeness and TPR rates (98.2%),
outperforming single-agent and chain-of-thought (CoT) baselines. Importantly, the framework supports flexible
reconfiguration and discusses deployment strategies such as automated parsing, input normalization,
and an “argument language” for inter-agent communication.
      </p>
      <p>
        The work in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] extends this idea by integrating five cooperative agents (text, URL, metadata,
explanation, and adversarial) whose contributions are weighted via proximal policy optimization (PPO). A key
innovation is the inclusion of an adversarial agent that generates paraphrased or restructured phishing
emails, enabling the detection system to adapt to evolving attacks. An explanation-simplifier agent
translates technical reasoning into user-friendly summaries, thereby enhancing trust and auditability.
Experimental results demonstrate a balanced performance with 97.89% accuracy, FP of 2.73%, and FN of
0.20%, along with robustness against URL shorteners and style variations. The system also demonstrates
scalability and compatibility with existing email security infrastructure.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], three specialized models separately process URL strings, webpage content, and DOM
structures, after which the final classification is made based on the highest confidence score. This parallel
feature processing reduces the likelihood of correlated errors and yields high accuracy (99.21%) with
low false positives. The architecture is resilient to previously unseen websites due to a combination
of generic and domain-specific indicators. Practical deployment considerations include server-side
scalability and container-based accelerated execution, with a roadmap for reinforcement learning
integration.
      </p>
      <p>
        Multimodality is further explored in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], where the authors combine multilingual large language
models (MLLMs) with online and ofline knowledge bases. Multimodal queries are constructed from
visual (logos, favicons) and structural (HTML/DOM) signals, with a top-k retrieval strategy from ofline
knowledge improving detection of rare brands. This approach increases recall and reduces FP/FN rates
with low latency. The study also addresses security concerns, such as trust in external knowledge
and resilience against manipulated data sources, framing the method as a step toward explainable
multimodal detection.
      </p>
      <p>
        Several works have emphasized practical user-side deployment. In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], the authors propose a
browser extension + Docker + BiLSTM with attention pipeline for real-time URL classification, including
detection of hidden redirects from HTML/JS. Three aggregation strategies are evaluated (SPhS, MSS,
WeAS), with WeAS achieving the best trade-of. The system is particularly efective against
Browserin-the-Browser attacks by analyzing both primary and embedded URLs. Engineering considerations
such as caching, containerization, and timeout management are presented to ensure integration with
minimal infrastructure changes.
      </p>
      <p>
        Beyond phishing websites, [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] addresses online social networks (OSN) by combining semantic profile
attributes, text stylometry, and relational/graph features to detect impersonation and account cloning.
The ensemble method achieves ∼ 95% accuracy, outperforming individual classifiers and maintaining
robustness with incomplete or noisy attributes. Ablation studies highlight the contribution of each
feature group, improving interpretability and deployment optimization. Cross-platform applicability
and privacy policy constraints are also considered.
      </p>
      <p>Recent work also explores federated learning (FL) for intrusion detection systems (IDS). In [17],
decentralized sensor-level detection is performed with continuous local updates and knowledge
aggregation through FL under non-IID trafic conditions. Sequential packet labeling enables early detection,
with CNNs exceeding 95% detection and LSTMs capturing attacks within the first 15 packets.
Communication cost analysis demonstrates trade-ofs between synchronization frequency and detection
quality. Similarly, [18] surveys FL paradigms for IDS across domains such as IoT, healthcare, finance,
and enterprise networks, highlighting challenges such as model poisoning, gradient anomalies, and
secure aggregation. The paper outlines a roadmap for scalable and reliable FL-based IDS.</p>
      <p>Other works focus on hierarchical and anomaly-based methods. In [19], the authors design a
multi-layer architecture with behavior-driven trafic sampling and hidden Markov models (HMMs)
to predict multi-stage attacks. The system reduces event mixing and achieves up to 7.5× processing
acceleration over centralized methods, addressing scalability in high-throughput networks. In [20], a
hybrid detection pipeline is introduced that combines min–max normalization, feature reduction via
Equilibrium Optimizer, and an LSTM-AE model tuned by an improved Snow Ablation Optimizer. On
CIC-IDS2017, this approach achieves 99.46% accuracy, surpassing state-of-the-art anomaly detection
benchmarks. A coarse-to-fine filtering scheme is proposed in [ 21], where a primary particle filter
removes obvious anomalies and a secondary filter targets subtler deviations. This reduces false alerts
while preserving sensitivity and scalability for large trafic volumes.</p>
      <p>The paper [22] provides a comprehensive survey of IDS methods, classifying them into misuse and
anomaly-based approaches and mapping architectural patterns (centralized, distributed, edge-based).
The paper discusses datasets, deployment scenarios (cloud, IoT, ICS), and integration with AI/ML and
blockchain for log integrity. A comparative threat-method matrix is introduced, along with directions
for future work such as multi-agent hierarchies and privacy-preserving FL protocols.</p>
      <p>Taken together, these studies demonstrate a strong need of the construction of the eficient method
for synthesising system architecture for IT infrastructure resistant to social engineering attacks. While
high accuracy has been achieved, challenges remain in adaptability to evolving attacks, interpretability
of decisions, and practical deployment under resource constraints.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Methods and material</title>
      <sec id="sec-3-1">
        <title>3.1. Fundamentals of the method</title>
        <p>The study proposes a method for synthesizing the architecture of an IT-infrastructure system resilient
to social-engineering attacks, based on a hierarchical multi-agent system employing reinforcement
learning. The method enables construction of a system capable of detecting social-engineering attacks
and relies on the interaction of specialized components that reflect the key processes of analyzing the
information environment.</p>
        <p>At the core is an agent which, in coordination with an attack classifier, formulates the dialogue policy
between the system, the user, and other sources of threat. The agent directs the collection of contextual
and technical features of a message or interaction, taking into account input information that may
indicate a social engineering attack, for example, lexical–semantic features of an email’s text, network
connection parameters, user behavioral characteristics within the communication channel, etc. The
attack classifier operates at two levels:
1. At first level it determines whether the incoming information exhibits signs of social engineering.
2. At second level it refines the assessment to identify the type (class) of attack and the specific
tactic employed by the adversary.</p>
        <p>An important role is played by the Condition Monitor Component (CMC), which accumulates all
collected indicators and provides a holistic representation of the current interaction context. This
prevents redundant checks, preserves the history of gathered features, and dynamically updates the
probabilistic estimate of a message’s belonging to a given attack category. Complementing this, a
Simulation Engine Component (SEC) models user responses or attacker behaviors, creating conditions
for training agents in an environment characterized by high uncertainty and a diversity of possible
adversary strategies.</p>
        <p>The whole system is conceived as a hierarchical structure in which a high-level agent decides which
specific actions to assign to specialized lower-level sub-agents. These actions may include analysis of
URL structure, domain-reputation checks, semantic assessment of a message, or detection of indicators
of psychological pressure in voice calls. In this way, a multi-layered decision-making system is formed
that can respond flexibly to novel social-engineering tactics and reduce risks to the IT infrastructure by
proactively collecting relevant features and progressively decreasing the entropy of the information
state.</p>
        <p>The method includes the usage of the Interaction Manager Component (IMC) – a full-fledged agent
capable of goal-oriented interaction of making the dialogs with the information environment. At
each time step  the agent receives from the Condition Monitor Component the current environment
configuration, which reflects the set of indicators and behavioral characteristics collected so far. This
state is then mapped to the selection of an action   from the set of possible actions  according to the
policy ( ( )).</p>
        <p>|</p>
        <p>
          A Simulation Engine Component generates a response that serves as the basis for computing the
reward signal  , which is returned to the agent. As a result, the environment transitions to a new state
( + 1) , and thus unfolds a sequence of iterations that simulate the real dynamics of communication.
The goal of the agent is to find the optimal policy that ensures the maximization of the expected
cumulative reward. The reward  is defined by the function Ω(( ),   ), where the coeficient
 ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] serves as a discount factor that reduces the weight of temporally distant outcomes, while Θ
denotes the maximum number of dialogue steps.
        </p>
        <p>The environment state describes the set of collected attack indicators, which may include signs of
phishing messages, linguistic markers of psychological pressure, email metadata, or characteristic URL
patterns. Let us denote  as the set of social engineering attack types, and  – the set of indicators
associated with these attacks. Then the state ( ) can be represented as a vector [ 1,  2, . . . ,  ||, , ] ,
where each component   – is an encoded ternary representation of the indicator’s presence: confirmed
presence, confirmed absence, or uncertain state. The vector includes the parameter  , that reflects the
current dialogue step, and the variable , which signals the repetition of previous queries. This
formalization allows the method not only to accumulate knowledge about the collected indicators but also to
adaptively manage the querying strategy, minimizing informational redundancy and improving the
accuracy of social engineering detection under conditions of incomplete and contradictory information.</p>
        <p>The agent’s action space is formed as the union of two subsets representing diferent types of actions
in the process of detecting social engineering attacks. Let us present  =  ∪ , where  denotes
the set of attack types, and  - the set of indicators that can be queried to clarify the context of the
message or interaction. If the selected action   belongs to , the agent initiates a request for additional
information regarding a specific indicator, for example, checking for suspicious domains, characteristic
URL patterns, lexical markers of psychological pressure, or anomalous user behavior signals. In the
case of selecting an action from the subset  the agent forms the final decision regarding the probable
type of attack, which concludes the interaction process within the current scenario.</p>
        <p>The success of the process is evaluated based on the accuracy of threat identification, that is, how
correctly the agent classified a specific interaction into a particular class of social engineering. This
formalization allows the agent to dynamically balance between actively gathering features and making
decisions, optimizing interaction of making the dialogs with the information environment to achieve
maximum eficiency under conditions of incomplete or contradictory information. At the same time, the
hierarchical structure of the system provides flexibility in the allocation of computational resources and
contributes to the gradual reduction of uncertainty in assessing the risk of each message or interaction,
which is critically important for the resilience of IT infrastructure against social engineering attacks.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Synthesis of the architecture of an IT infrastructure system</title>
        <p>Let us denote the set of social engineering attacks as the set  divided into  groups, where  =
1 ∨ 2 ∨ · · · ∨   , the subsets do not intersect, that is  ∧  = ∅ for  ̸= , ,  = 1, . . . , . Each subset
 corresponds to a specific category of attacks or an adversary’s tactical strategy and is associated
with its own set of indicators , which characterize the features of messages, behavioral patterns, or
technical signs inherent to this group. Such organization allows lower-level agents of the system to
focus on specific types of threats without spending resources on analyzing less relevant signals, while
also maintaining the modularity and scalability of the architecture.</p>
        <p>The hierarchical structure of the multi-agent system provides for two levels:
1. The upper-level Decision Agent (DA), which coordinates the overall policy of information
gathering and decision-making;
2. The lower-level Service Agents, each are responsible for its own subset of attacks  and the
indicators associated with it .</p>
        <p>Service Agents perform local analysis functions, initiate requests to users or system sensors, evaluate
message attributes, and transmit the results to the upper-level coordinator. Due to this distribution of
responsibilities, the Decision Agent can make informed decisions based on aggregated signals aimed at
minimizing risk and reducing uncertainty regarding the nature of a potential attack.</p>
        <p>The selection of actions by agents is formalized through the mapping of the environment state
( ) to the action space   from the set  =  ∪ , where each lower-level action concerns only a
subset of indicators , and the actions of the upper-level agent coordinate the sequence of queries
and the final assessment of the threat type. Such a hierarchical organization allows the system to
gradually accumulate relevant features, adaptively adjust the data collection strategy, and ensure
efective detection of complex social engineering scenarios even under conditions of incomplete or
contradictory information.</p>
        <p>In each interaction cycle, the central agent receives the state of the environment ( ) , which reflects
the set of all collected indicators of potential social engineering attacks at that moment. Based on the
policy  0( 0 |( )) the upper-level agent makes a decision regarding the further course of action:
to continue collecting features through queries to the user or system sensors, or to form the final
assessment of the probable type of threat.</p>
        <p>The action space of the Decision Agent is defined by the set 0 = {1, 2, . . . ,  , }, where 
denotes the Service Agent responsible for analyzing a specific subset of indicators , and  corresponds
to the attack classification module. When one of the Service Agents is activated, a subtask is initiated,
within which the following  ∈ [ 0,  0 + ] feature collection steps are performed by the same Service
Agent, where  defines the maximum number of iterations for the subtask. The current subtask ends
after receiving a specific response to the indicator query, which can take discrete values, for example,
“confirmed” or “not confirmed”. If the classification module  is activated, the upper-level agent forms
the final decision about the type of attack, completing the current interaction cycle.</p>
        <p>The Decision Agent coordinates the work of all Service Agents, optimizes the sequence of queries and
decision-making, while the Service Agents focus on local feature collection subtasks, which significantly
reduces computational complexity and increases the accuracy of detecting complex social engineering
scenarios. At the same time, this system architecture allows agents to adaptively change their strategy
depending on the current state of the environment, minimizing uncertainty and increasing the resilience
of the IT infrastructure to social engineering attacks.</p>
        <p>When a Service Agent is activated, it receives the environment state ( ) and extracts the relevant
indicators   , that correspond to its assigned threat subgroup,   = [ 1,  2, . . . ,  ||, , ] . Each
Service Agent operates within a local feature subspace, allowing it to focus on specific categories of
social engineering attacks and the corresponding behavioral or technical signals. Based on the local
policy, produced by the Interaction Manager Component  (  |  ) the Service Agent selects the next
indicator for clarification or verification, performing steps to collect additional information that refine
the probability of a specific type of attack.</p>
        <p>The action space of each Service Agent is defined by the set  =  1,  2, . . . ,  ||, where each element
corresponds to a specific indicator or pattern that the agent can query or verify within its subtask.
This localization of actions allows Service Agents to gradually accumulate knowledge about a specific
threat category, reducing noise from less relevant signals and ensuring a more accurate risk assessment.
Hierarchical interaction with the Decision Agent makes it possible to aggregate these local results and
adjust the overall system policy, increasing the adaptability and resilience of the IT infrastructure to
social engineering attacks even under complex conditions of incomplete or contradictory information.</p>
        <p>
          In the hierarchical architecture with reinforcement learning, the Decision Agent receives an external
reward  at each interaction cycle, which reflects the efectiveness of the decisions made in detecting
potential social engineering attacks. After the subtask is completed, Decision Agent calculates the
accumulated reward Ω 0 for the given cycle, taking into account the contribution of each Service Agent
and the results of the local evaluation of indicators. Let  denote the number of Service Agents, and
 ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] – the discount factor, that reduces the weight of temporally distant outcomes. Then, the
accumulated reward is defined as:
Ω 0 =
{︃∑︀ (+) , if  0 =  ;
        </p>
        <p>=1   
() ,
if  0 = .
where  - the Service Agent responsible for the subtask of analyzing the subset of indicators , 
the attack type classification module.</p>
        <p>Such formalization allows the Decision Agent to integrate the results of local analysis, evaluate the
efectiveness of actions at all levels, and adaptively adjust the policy for data collection and
decisionmaking. The use of discounting  ensures a balance between short-term and long-term outcomes, which
is critically important for improving the accuracy of detecting complex social engineering scenarios.</p>
        <p>The goal of the update (Θ 0) is defined through the discrete learning dynamics based on the
reinforcement signal and the interaction history. Let  ′ denote the next state of the environment after
performing the action  0′, Θ ′0 - the parameters of the target network, Θ 0 – the parameters of the current
network, and 0 - the Decision Agent’s experience replay bufer. Then the loss function is defined as:
(Θ 0) = , 0,Ω0, ′∼ 0 ((Ω 0 +  max 0( ′,  0′; Θ ′0) −  0( ′,  0; Θ 0))2),
 ′0
(1)
(2)
(3)
where ( ,  ; Θ ) evaluates the expected cumulative reward under the current local policy, and the
term  max  ′ ( ′,  ′; Θ ′) takes into account the long-term consequences of the agents’ actions. Such
a formalization allows the Service Agents to adaptively adjust their own feature collection strategy,
focusing on local subtasks, and gradually improves the accuracy of risk assessment for specific attack
categories. Coordination with the Decision Agent allows aggregating local results and ensures the
optimization of the overall system policy.
where 0(,  0; Θ 0) evaluates the expected cumulative reward under the current policy, and the term
 max  ′0 0( ′,  0′; Θ ′0) ensures the consideration of the long-term consequences of actions. Such a
formalization allows the Decision Agent to efectively integrate information from the Service Agents
and the Classification module, evaluating both the short-term and long-term efects of its decisions,
which is critical for improving the accuracy of detecting complex social engineering attacks. The Service
Agents, receive an internal reward  at each interaction cycle, which evaluates the efectiveness of
their local work with the subset of indicators , assigned to a specific category of social engineering
attacks.</p>
        <p>The goal of the Service Agents is to maximize these rewards, which ensures accurate and eficient
execution of information gathering subtasks. The loss function of each Service Agent (Θ ) is defined
based on the local policy and the interaction history in the replay bufer , where Θ ′ denotes the
parameters of the target network, and Θ  - the parameters of the current network:
(Θ ) =  , ,Ω, ′∼  ((Ω  +  max ( ′,  ′; Θ ′) −  ( ,  ; Θ ))2),</p>
        <p>′
while the initial entropy of the Service Agents is calculated using the formula:
 ( 0) = −
 ( 0) = −</p>
        <p>∑︁  log(),
=1
||
∑︁  log().</p>
        <p>=1</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Reward calculation</title>
        <p>Within the hierarchical system architecture, starting from the initial state  0, for the main threat
classifier and auxiliary classifiers specializing in individual categories of social engineering attacks, the
initial probabilistic distributions are formed. For the Decison Agent, let us denote this distribution as
0 = [1, 2, . . . , ], where each component  corresponds to the posterior estimate of the current
scenario’s belonging to a certain class of threats. For the Service Agents, we define a similar distribution
0 = [1, 2, . . . ,  ], where each element represents the probability of detecting the corresponding
attack subcategory within the set of possible actions .</p>
        <p>An important characteristic of these distributions is an entropy, which reflects the degree of
uncertainty in decision-making. The initial entropy of the Decison Agent, operating at the level of the
integral threat assessment, is defined by the expression:</p>
        <p>Both entropy metrics serve as normalizers, preventing biases in rewards during diferent interaction
episodes. This is especially important when the nature of information information coming from users or
the system’s internal components can vary significantly between scenarios. Thus, by using entropy as a
control parameter, the hierarchical multi-agent system gains the ability to adaptively balance between
attack detection accuracy and resilience to information noise, which is characteristic of real-world IT
infrastructure operation conditions.</p>
        <p>Similarly, at the time moment  the information entropy of the main Decision Agent classifier is
calculated  (  ) and the Service Agent classifier  (  ). After the system takes an action and
transitions to a new state  +1 , the updated entropy values are determined as  ( +1 ) and  ( +1 ).
The diference between these values becomes the basis for calculating the reward, which characterizes
the reduction of uncertainty in the work of the Decision Agent and the Service Agents.</p>
        <p>For the Decision Agent the reward value is defined by the relation:
The the Service Agents reward value is defined by the formula:
 entropy = max
︂( ( (  ) −  ( +1 )) )︂</p>
        <p>, 0 .</p>
        <p>( 0)
 entropy = max
︂( ( (  ) −  ( +1 )) )︂</p>
        <p>, 0 .</p>
        <p>( 0)</p>
        <p>In these expressions, the ratio of the entropy diference to the initial value normalizes the functional,
allowing the system to adequately compare the level of information gain across diferent interaction
episodes. The use of the max operator prevents the occurrence of negative values, as in practice there
may be situations where, due to incomplete data or noisy signals, entropy increases, and thus uncertainty
does not decrease. This step ensures stable learning aimed at gradually reducing informational chaos,
which is characteristic of social engineering attacks where adversaries often create situations of cognitive
confusion. With such a reward structure, the hierarchical multi-agent system gains an additional
selfadaptation mechanism aimed at finding solutions that minimize the entropy of the state, gradually
transitioning the infrastructure from an uncertain state to one with a clear diagnostic conclusion
regarding the presence or absence of attack indicators.
(4)
(5)
(6)
(7)</p>
        <sec id="sec-3-3-1">
          <title>3.3.1. External reward for the decision-making agent</title>
          <p>The external reward  ext is defined piecewise as follows:</p>
          <p>ext = ∑︁  +  entropy,</p>
          <p>=1
where  is a positive if the agent emits a final decision and that decision is correct (success condition is
met);  is negative if the selected action at step , repeats a previously executed action in the same
episode (action repetition detected, redundant queries are penalized), or if the maximum permitted
number of interaction steps is reached without a final decision (episode budget exhausted, indecision
are penalized);  is equal to 0 in all other cases (ongoing interaction, reward proportional to the
reduction of uncertainty, the incremental benefit of informative actions that reduce uncertainty are
scaled);  entropy &gt; 0.</p>
        </sec>
        <sec id="sec-3-3-2">
          <title>3.3.2. Internal reward for the service agents</title>
          <p>The internal reward  int for a Service Agent is defined as follows:</p>
          <p>int = ∑︁  +  entropy,</p>
          <p>=1
where  is a positive if the Service Agent’s query yields a definitive and correct resolution of a targeted
indicator or feature (correct match observed);  is a negative if the Service Agent issues a repeated or
redundant query that does not bring new information (repetition in actions);  is equal to 0 in all other
cases (progressive uncertainty reduction without a definitive match);  entropy &gt; 0.</p>
          <p>The maximum number of interaction steps sets an upper bound on episode length and appears in
the timeout condition for the external reward. The normalization by the initial entropy for both levels
ensures that rewards are comparable across diferent scenarios with varying prior uncertainty. The
“success” term aligns the upper-level agent with accurate final classification, while the local “match”
term aligns service agents with accurate and eficient feature resolution. The repetition penalties at both
levels act as regularizers against cycles and unnecessary queries. Together, these definitions balance
the desire for short, decisive interactions with the requirement to reduce diagnostic uncertainty in a
principled, quantifiable way.</p>
          <p>The hierarchical reward structure ensures a harmonious distribution of roles between system levels,
where the Decision Agent acts as the coordinator for IT-infrastructure security evaluation, and the
subordinate agents serve as local filters, enabling the formation of multi-level protection against
social engineering attacks, reducing the risks of cognitive manipulation, and ensuring efective system
adaptation in a dynamic environment.</p>
          <p>In addition to the reward based on the reduction of entropy uncertainty, the main agent receives
additional reinforcements that are generated depending on the outcome of the decision made. If the
ifnal classification of the attack scenario is successful, that is, the system correctly identifies a social
engineering attempt or confirms its absence, then a positive reward increment is applied, denoted as
 +. In the case of incorrect identification or reaching the maximum allowable number of dialogue
iterations, a penalty component is introduced  − , which reflects the ineficiency of the agent’s strategy.</p>
          <p>For the Service Agents performing localized tasks of analyzing individual user behavioral features,
the reward is determined according to a diferent principle. If the selected agent correctly refines a
feature characterizing a possible attack and receives an unambiguous response from the environment
(for example, confirmation or denial of the feature, similar to “yes” or “no” responses in a medical
dialogue), then it receives a positive increment  +. If a repeated query occurs that does not reduce the
entropy of the information state and leads to informational noise, then a negative penalty is introduced
 − .
(8)
(9)</p>
          <p>The formalization of reinforcement signals at diferent levels of the system architecture combines
the global assessment of the main agent’s performance with the local accuracy of the subordinate
agents’ work. The use of parameters  +,  − ,  + and  − makes it possible to balance the strategic and
tactical aspects of the system’s functioning, creating conditions for adaptive learning in a dynamic
environment. In the context of countering social engineering attacks, this means that the main agent
learns to distinguish the overall structure of manipulative scenarios, while the Service Agents focus on
the smaller details of the interaction, which together form a holistic and resilient behavioral model of
the IT infrastructure.</p>
        </sec>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Knowledge development for interaction manager component</title>
        <p>Within the proposed system architecture, knowledge about social engineering attack scenarios was
be represented in the form of a knowledge graph integrated into the interaction manager component.
In this graph, the nodes correspond to attack indicators and their manifestations, as well as classes of
attack actions, while the edges describe the correlation dependencies between these elements. Each
edge is assigned a weight that characterizes the degree of interconnection between a specific indicator
and the attack class, with the weight value determined based on the probabilistic statistics obtained
during the analysis of training and testing scenarios.</p>
        <p>Since the method employs a hierarchical multi-agent structure, the Service Agents are responsible for
processing subsets of possible indicators and attack classes. For each such agent, a separate knowledge
subgraph is constructed, containing a set of indicators  and a set of attacks , relevant to its
subsystem. This ensures computation localization and reduces the overall complexity of architecture
synthesis, as individual agents specialize in specific classes of threats.</p>
        <p>The edge weights in the subgraphs are interpreted as conditional probabilities of observing a feature
given the occurrence of a particular attack class. To formalize such a dependency, the following relation
is introduced as following:
( | ) =</p>
        <p>(, )
∑︀=1 (, )</p>
        <p>,
  = arg max(( (  )) + (( ))),</p>
        <p>
          where (  ) the distribution  - of the values computed by the Service Agent for the state   
the sigmoid normalization function, which maps values into the [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ] range, and argmax function
where (, ) denotes the number of recorded scenarios in which an attack of type is accompanied
by the manifestation of the feature .
        </p>
        <p>By calculating the probability value for each “attack–feature” pair, it is possible to construct a
conditional probability matrix Λ  ∈ ||×| |, which is used in the agent training process. Such a
formalization makes it possible to represent the complex multidimensional structure of dependencies
between diferent types of social engineering attacks and their features, thereby providing the capability
for adaptive agent learning in the process of interacting with potentially hostile scenarios.</p>
        <p>Based on the conditional probability matrix introduced earlier, the current probability distribution of
feature manifestations for the Service Agents is defined as:
(10)
(11)
(12)
( ) = Λ  · ( ),
where ( ) ∈ ||×1 the probability vector of the corresponding attack classes, which is calculated
by the subordinate classifier for the subgroup , and ( ) ∈ ||×1 - the probability distribution for
local features relevant to this agent. This operation transforms the probabilities of attack classes into
the probabilities of specific feature manifestations, providing the basis for the agent’s decision-making.</p>
        <p>Next, this probability distribution is combined with the estimates  - of the values computed by
the Service Agents, which allows taking into account both prior knowledge about the probabilities
of feature occurrences and the agent’s learning experience in a dynamic environment. Formally, the
choice of the agent’s next action is expressed as:
determines the feature or action class on which the agent stops its choice for further querying or
evaluation.</p>
        <p>Due tothis combination of probabilities and  - values, the agent gains the ability to take into account
both prior experience and updated information about user or system behavior, which is critically
important for countering social engineering attacks. This approach allows the agent to adaptively select
priority features for verification, increasing detection accuracy and reducing the likelihood of erroneous
assessments in the multi-level system.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments</title>
      <sec id="sec-4-1">
        <title>4.1. Settings and dataset</title>
        <p>To evaluate the efectiveness of the proposed hierarchical multi-agent architecture four aspects were
investigated:
1. Accuracy via the testing whether the hierarchical design improves both binary detection and
tactic/type classification relative to single-agent and non-hierarchical baselines.
2. Eficiency via examining whether adaptive, entropy-driven querying shortens interaction length
and reduces latency without sacrificing accuracy.
3. Generalization via measuring the transfer across Social engineering channels (email and phishing
webpages, OSN impersonation, and voice vishing) and robustness to out-of-distribution attacks.
4. Ablations via quantifying the contribution of the hierarchy itself, knowledge-graph priors, and
entropy-based reward shaping to overall performance.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Environment settings</title>
        <sec id="sec-4-2-1">
          <title>4.2.1. Software and hardware setup</title>
          <p>All experiments were implemented in Python version 3.11 using the PyTorch deep-learning framework
version 2.x. GPU acceleration was enabled through NVIDIA’s Compute Unified Device Architecture
(CUDA) version 12 and the CUDA Deep Neural Network library (cuDNN) version 9. Text tokenization
and parsing of the Document Object Model of web pages were performed with the beautifulsoup4
library [23]. For reproducible web rendering we used Playwright in headless mode on locally stored
page captures (no live network requests during evaluation). Model training was conducted on a single
Nvidia GeForce RTX 4070 graphics processor.</p>
        </sec>
        <sec id="sec-4-2-2">
          <title>4.2.2. Agents and learning setup</title>
          <p>Decision Agent. The high-level controller is a Deep Q-Network with a separate target network [24, 25,
26]. The discount factor was set to 0.99. We used an experience replay bufer of 200,000 transitions, a
mini-batch size of 256, and the Adam optimizer with a learning rate of 3 × 10 −4 . Exploration followed
an epsilon-greedy schedule that decayed linearly from 0.20 to 0.01 over 200,000 environment steps.</p>
          <p>Service Agents. Two specialized lower-level agents process the email and the web modalities,
respectively. They share modality-appropriate encoders: a Transformer or a Bidirectional Long
ShortTerm Memory network for textual signals; and a combination of Convolutional Neural Networks and
Multilayer Perceptrons for features derived from the Document Object Model, uniform resource locators,
and auxiliary metadata.</p>
          <p>Hierarchical control. The Decision Agent selects which Service Agent to query and when to
terminate the interaction. Unless otherwise specified, we cap the interaction budget at a maximum of
ifve agent actions per example.</p>
          <p>Knowledge-graph priors. We incorporate prior knowledge by initializing the Service Agents’
classification logits with probabilities of the form  (feature | attack) computed from a domain knowledge
graph, and by masking Decision-Agent actions that contradict these priors.</p>
          <p>Entropy-aware rewards. The training objective adds an uncertainty-reduction term that rewards
decreases in predictive entropy, together with penalties for repeated or low-information actions. This
encourages short, informative interaction sequences and calibrated decisions.</p>
          <p>Baselines. We compared the hierarchical architecture against:
1. a rule-based system constructed from common indicators;
2. the strongest single-modality models trained with only uniform resource locators, only text, or
only Document Object Model features;
3. a flat Deep Q-Network that operates as a single agent without any hierarchy;
4. a late-fusion ensemble that stacks independent modality-specific classifiers;
5. hierarchical variant trained without the entropy-based reward term;
6. ablation variants that remove, respectively, the hierarchical structure, the knowledge-graph priors,
or the entropy component of the reward.</p>
        </sec>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Dataset description</title>
        <p>The proposed approach employed a combined corpus that contains both electronic mail messages
and web pages. Each item is annotated to one of the attack types in the study’s taxonomy: vishing
attack, phishing attack, profile cloning, grooming, dumpster-diving attacks, tailgating, file masquerade,
baiting, scareware or deceptive pop-up windows, water-holing, trojan mail, spear phishing, spam mail,
“interesting software” lure, and hoaxing. For attack categories that do not naturally arise from sensors
or on-site observations (such as tailgating and dumpster diving) the evidence appears in textual form
(for example, narrative descriptions or instructions) within emails or landing pages rather than as
physical-world measurements.</p>
        <sec id="sec-4-3-1">
          <title>4.3.1. Corpus composition</title>
          <p>The dataset comprises 80,000 total samples: 48,000 emails (approximately 24,000 malicious and 24,000
benign) and 32,000 web pages (approximately 16,000 malicious and 16,000 benign).</p>
        </sec>
        <sec id="sec-4-3-2">
          <title>4.3.2. Training, validation, and test splits</title>
          <p>The corpus was partitioned into 70% training, 10% validation, and 20% test sets using chronological
order when timestamps are available, so that training precedes validation and test in time. To reduce
information leakage, we enforce disjointness across internet domains for web pages and across authors
or sender identities for emails. The near-duplicates across splits using text similarity hashing (SimHash)
for textual content, perceptual hashing for rendered visuals, and normalization of uniform resource
locators to collapse superficial variations were removed.</p>
        </sec>
        <sec id="sec-4-3-3">
          <title>4.3.3. Preprocessing pipeline</title>
          <p>The automatic language identification and mask personally identifiable information in stored artifacts
was performed. For web pages, the redirects to obtain the final destination prior to feature extraction
were resolved. The structural tokens that encode page behavior and intent, such as form submission
actions and link targets were derived. These steps standardize inputs across sources, reduce spurious
correlations, and enable consistent feature extraction for both the email and web modalities.</p>
        </sec>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Experimental results</title>
        <sec id="sec-4-4-1">
          <title>4.4.1. Binary detection on the combined email and web corpus</title>
          <p>The hierarchical architecture with the a high-level Decision Agent that orchestrates modality of the
specific Service Agents achieves higher accuracy, better operating characteristics, and fewer actions per
example than non-hierarchical baselines under the same interaction budget. Table 1 presents the area
under the receiver operating characteristic curve, the area under the precision–recall curve, the F1-score,
the false-positive rate at 95% true-positive rate, the actions per sample, and the median end-to-end
latency in milliseconds.</p>
          <p>Relative to the single-agent Deep Q-Network baseline, the hierarchical design improves the area
under the receiver operating characteristic curve by +0.04, reduces the false-positive rate at 95%
truepositive rate by − 0.07, and cuts the number of actions per sample by approximately 47% (from 6.1 to
3.2), demonstrating simultaneous gains in accuracy and eficiency.</p>
        </sec>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Fine-Grained Tactic/Type Classification</title>
        <p>The multi-class performance over the taxonomy of social-engineering attack types was assessed. Because
several categories are relatively rare, macro-averaged F1 was reported. It gives each class equal weight
regardless of frequency. Results are shown separately for the email and web modalities in Table 2.</p>
        <p>The hierarchical policy guided by the Decision Agent and supported by knowledge-graph-primed
Service Agents yields +9 to +10 macro-F1 points over the strongest non-hierarchical alternatives in
both modalities, indicating more reliable recognition of rare tactics.</p>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Ablation Snapshot: Efect of Removing the Hierarchy</title>
        <p>To isolate the contribution of the hierarchical control itself, encoders, optimization settings were hold.
As a result, the full system with a single-agent configuration was compared. Table 3 summarizes the
efect on accuracy and eficiency.</p>
        <p>The hierarchical Decision Agent + Service Agents structure is the dominant source of the eficiency
gains (reduction of actions per sample by 2.5) while simultaneously improving performance at stringent
operating points (false-positive rate at 95% true-positive rate improves from 0.12 to 0.08).</p>
        <p>Across both binary detection and fine-grained tactic/type classification tasks on the combined email
and web corpus, the hierarchical design with a Decision Agent coordinating modality-specific Service
Agents consistently outperforms single-agent and other non-hierarchical baselines. It achieves higher
accuracy with fewer interaction steps and improved operating characteristics at practically relevant
true-positive rates.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>Area under
ROC curve
0.92
0.88
The research introduced the method for synthesising system architecture for IT infrastructure resistant
to social engineering attacks. The central design principle is to separate high-level decision making from
modality-specific analysis: a Decision Agent coordinates specialized Service Agents for email and web
content, selecting which evidence to gather, when to stop, and how to fuse signals into a final decision.
Two ingredients make the hierarchy efective in practice. First, knowledge-graph priors encode the
likelihood of observing particular indicators under each attack type, guiding early, informative queries
and constraining implausible actions. Second, an entropy-aware training objective rewards reductions
in predictive uncertainty while discouraging repeated or low-information actions, promoting short,
purposeful interactions and calibrated outputs.</p>
      <p>Evaluated on a combined corpus of email messages and web pages labeled with a comprehensive
taxonomy of social-engineering tactics, the proposed system consistently outperformed single-agent
and other non-hierarchical baselines. It achieved higher accuracy in both binary detection and
finegrained tactic/type classification, lowered the false-positive rate at stringent operating points, and
reduced the number of actions per example, thereby improving latency and computational eficiency.
These gains held across modalities, indicating that hierarchical control helps the system focus on the
most discriminative indicators for each channel and transfer that skill between channels.</p>
      <p>Beyond raw accuracy, the architecture demonstrates operational qualities that matter for deployment:
(i) principled use of prior knowledge to steer early decisions; (ii) explicit control over interaction budgets
to meet latency constraints; and (iii) improved calibration, which supports safer thresholding in settings
where false alarms or missed attacks carry asymmetric costs. Together, these properties provide a
practical path for building adaptive, multi-level defenses that remain efective as adversaries change
their strategies.</p>
      <p>The study has limitations. Some attack categories in the taxonomy (for example, tailgating or
dumpster diving) appear only through textual descriptions rather than direct physical-world signals;
expanding data sources to include sensors or access-control logs would strengthen coverage of such
scenarios. Performance depends on the quality and currency of the knowledge graph; automated
mechanisms for updating priors and handling conflicting evidence are needed. Finally, while the
experiments focused on email and web content, broader evaluation on additional channels (voice calls,
social-network interactions, and cross-channel campaigns) and in live, user-in-the-loop settings will be
necessary to fully validate robustness.</p>
      <p>Future work will integrate additional modalities (for example, voice and social graphs), extend the
interaction manager with cost-aware planning for real-time constraints, and couple the agents with
explanation interfaces that surface the indicators and reasoning steps behind decisions. We also plan to
explore online learning to adapt priors and policies as attackers evolve. In sum, hierarchical coordination
of specialized agents, informed by structured prior knowledge and trained to reduce uncertainty, ofers a
principled and empirically validated foundation for resilient defenses against social-engineering threats.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly in order to: grammar and spelling
check; DeepL Translate in order to: some phrases translation into English. After using these
tools/services, the authors reviewed and edited the content as needed and take full responsibility for the
publication’s content.
[17] M. Soltani, K. Khajavi, M. J. Siavoshani, A. H. Jahangir, A multi-agent adaptive deep learning
framework for online network intrusion detection, Cybersecurity 3 (2024) 199–210. doi:10.1186/
s42400-023-00199-0.
[18] B. Buyuktanir, Ş. Altinkaya, G. K. Baydogmus, K. Yildiz, Federated learning in intrusion detection:</p>
      <p>Advancements, applications, and future directions, SpringerLink (2025).
[19] Y. Javed, M. A. Khayat, A. A. Elghariani, A. Ghafoor, Prism: A hierarchical intrusion detection
architecture for large-scale cyber networks, IEEE Transactions on Dependable and Secure Computing
20 (2023) 345–358. doi:10.1109/TDSC.2023.3240315.
[20] F. Alhayan, A. Alshuhail, A. O. A. Ismail, O. Alrusaini, S. Alahmari, A. E. Yahya, S. S. Albouq, M. A.</p>
      <p>Sadig, Enhanced anomaly network intrusion detection using an improved snow ablation optimizer
with dimensionality reduction and hybrid deep learning model (eaid-oadrhm), Scientific Reports
15 (2025) 1199655. doi:10.1038/s41598-025-97398-1.
[21] Unknown, Cyber threat detection and analysis using dual-layered hierarchical capacity particle
ifltering (hcpf), Taylor &amp; Francis Online (2025). doi:10.1080/08874417.2025.2553156.
[22] L. Diana, P. Dini, D. Paolini, Overview on intrusion detection systems for computers and networks,</p>
      <p>MDPI (2025).
[23] L. Richardson, Beautiful Soup: Python library for screen-scraping, https://www.crummy.com/
software/BeautifulSoup/, 2025. Version 4.14.2.
[24] J. Cai, M. Fu, Y. Yan, Z. Chen, X. Zhang, Deep q-network based battery energy storage system
control strategy with charging/discharging times considered, Applied Energy 398 (2025) 126384.
[25] J. Chen, X. Cheng, Y. Jia, S. Tan, Cloud–edge collaborative model adaptation based on deep
q-network and transfer feature extraction, Applied Sciences 15 (2025) 8335.
[26] I. Krak, O. Barmak, E. Manziuk, Using visual analytics to develop human and machine-centric
models: A review of approaches and proposed information technology, Computational Intelligence
38 (2022) 921–946. doi:10.1111/coin.12289.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Birthriya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ahlawat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <article-title>A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies</article-title>
          ,
          <source>Journal of Applied Security Research</source>
          <volume>20</volume>
          (
          <year>2025</year>
          )
          <fpage>244</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kolluri</surname>
          </string-name>
          ,
          <article-title>Revolutionary research on the ai sentry: an approach to overcome social engineering attacks using machine intelligence</article-title>
          ,
          <source>International Journal of Advanced Research and Interdisciplinary Scientific Endeavours</source>
          <volume>1</volume>
          (
          <year>2024</year>
          )
          <fpage>53</fpage>
          -
          <lpage>60</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H. N.</given-names>
            <surname>Fakhouri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Alhadidi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Omar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Makhadmeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Hamad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. Z.</given-names>
            <surname>Halalsheh</surname>
          </string-name>
          ,
          <article-title>Ai-driven solutions for social engineering attacks: Detection, prevention, and response</article-title>
          ,
          <source>in: 2nd International Conference on Cyber Resilience (ICCR)</source>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Rathod</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. K.</given-names>
            <surname>Jadav</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tanwar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alabdulatif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Garg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>A comprehensive survey on social engineering attacks, countermeasures</article-title>
          ,
          <source>case study, and research challenges, Information Processing &amp; Management</source>
          <volume>62</volume>
          (
          <year>2025</year>
          )
          <fpage>103928</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Waelchli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Walter</surname>
          </string-name>
          ,
          <article-title>Reducing the risk of social engineering attacks using soar measures in a real world environment: A case study</article-title>
          ,
          <source>Computers &amp; Security</source>
          <volume>148</volume>
          (
          <year>2025</year>
          )
          <fpage>104137</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kashtalian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sochor</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Avsiyevych, Multi-computer malware detection systems with metamorphic functionality, Radioelectronic and Computer Systems (</article-title>
          <year>2024</year>
          )
          <fpage>152</fpage>
          -
          <lpage>175</lpage>
          . doi:
          <volume>10</volume>
          .32620/reks.
          <year>2024</year>
          .
          <volume>1</volume>
          .13.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Bobrovnikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <article-title>Technique for iot malware detection based on control flow graph analysis</article-title>
          ,
          <source>Radioelectronic and Computer Systems</source>
          (
          <year>2022</year>
          )
          <fpage>141</fpage>
          -
          <lpage>153</lpage>
          . doi:
          <volume>10</volume>
          .32620/reks.
          <year>2022</year>
          .
          <volume>1</volume>
          .11.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bobrovnikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kharchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <article-title>Iot multi-vector cyberattack detection based on machine learning algorithms: trafic features analysis, experiments, and eficiency</article-title>
          ,
          <source>Algorithms</source>
          <volume>15</volume>
          (
          <year>2022</year>
          )
          <fpage>239</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryschuk</surname>
          </string-name>
          <article-title>, Multi-agent based approach of botnet detection in computer systems</article-title>
          , in: International Conference on Computer Networks, Springer,
          <year>2012</year>
          , pp.
          <fpage>171</fpage>
          -
          <lpage>180</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Huseynov</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. B. Ozdenizci,</surname>
          </string-name>
          <article-title>Using machine learning algorithms to predict individuals' tendency to be victim of social engineering attacks</article-title>
          ,
          <source>Information Development</source>
          <volume>40</volume>
          (
          <year>2024</year>
          )
          <fpage>298</fpage>
          -
          <lpage>318</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>W.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Manickam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-W.</given-names>
            <surname>Chong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karuppayah</surname>
          </string-name>
          ,
          <string-name>
            <surname>Phishdebate:</surname>
          </string-name>
          <article-title>An llm-based multi-agent framework for phishing website detection</article-title>
          ,
          <source>arXiv preprint arXiv:2506.15656</source>
          (
          <year>2025</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xue</surname>
          </string-name>
          , E. Spero,
          <string-name>
            <given-names>Y. S.</given-names>
            <surname>Koh</surname>
          </string-name>
          , G. Russello,
          <string-name>
            <surname>Multiphishguard:</surname>
          </string-name>
          <article-title>An llm-based multi-agent system for phishing email detection</article-title>
          ,
          <source>arXiv preprint arXiv:2505.23803</source>
          (
          <year>2025</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Jafari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Ghafoori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahmadinia</surname>
          </string-name>
          ,
          <article-title>Smart phishing detection on webpages using multiagent deep learning and multi-dimensional features</article-title>
          ,
          <source>International Journal of Smart Electrical Engineering</source>
          <volume>14</volume>
          (
          <year>2025</year>
          )
          <article-title>1199655</article-title>
          . doi:
          <volume>10</volume>
          .82234/ijsee.
          <year>2025</year>
          .
          <volume>1199655</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Hooi</surname>
          </string-name>
          ,
          <article-title>Phishagent: A robust multimodal agent for phishing webpage detection</article-title>
          ,
          <source>Proceedings of the AAAI Conference on Artificial Intelligence</source>
          <volume>39</volume>
          (
          <year>2025</year>
          )
          <fpage>27869</fpage>
          -
          <lpage>27877</lpage>
          . doi:
          <volume>10</volume>
          .1609/aaai.v39i27.
          <fpage>35003</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Asiri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Alzahrani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ju</surname>
          </string-name>
          ,
          <article-title>Phishingrtds: A real-time detection system for phishing attacks using a deep learning model</article-title>
          ,
          <source>Computers &amp; Security</source>
          (
          <year>2024</year>
          )
          <article-title>103843</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.cose.
          <year>2024</year>
          .
          <volume>103843</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>I.</given-names>
            <surname>Mohiuddin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Almogren</surname>
          </string-name>
          ,
          <article-title>Ensemble techniques for detecting profile cloning attacks in online social networks (osns</article-title>
          ),
          <source>PeerJ Computer Science</source>
          (
          <year>2025</year>
          )
          <article-title>e3182</article-title>
          . doi:
          <volume>10</volume>
          .7717/peerj-cs.
          <volume>3182</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>