Leveraging artifact reputation analysis and contextual sentiment analysis for advanced detection of vishing and smishing attacks

dc.contributor.authorDissanayake, D
dc.contributor.authorGamage, P
dc.contributor.authorKumarasinghe, N
dc.contributor.authorGanegoda, GU
dc.contributor.editorPiyatilake, ITS
dc.contributor.editorThalagala, PD
dc.contributor.editorGanegoda, GU
dc.contributor.editorThanuja, ALARR
dc.contributor.editorDharmarathna, P
dc.date.accessioned2024-02-05T13:05:36Z
dc.date.available2024-02-05T13:05:36Z
dc.date.issued2023-12-07
dc.description.abstractThe rise of advanced mobile technology has brought about the widespread presence of mobile devices in our society. These portable and versatile gadgets have become essential items for individuals due to their convenience and capabilities. As technology continues to play a pivotal role in modern life, an evergrowing number of people rely on mobile devices for almost all life activities including crucial financial activities and business routines. However, the increasing popularity of mobile devices has also exposed users to a heightened risk of falling victim to fraudulent schemes. Perpetrators have been exploiting mobile users by pretending to present authentic and legitimate requests and opportunities, leading to the divulgence of personal and sensitive information. These deceitful activities have seen a significant increase, affecting individuals of various ages, educational backgrounds, and levels of technological literacy. Additionally, malicious actors employ advanced methods to conceal their identities, making it challenging to prevent and counter these attacks. Two prevalent yet under-addressed issues in this context are vishing and smishing. This research study introduces a system designed to detect vishing and smishing attempts more accurately. The system analyzes the reputation of suspicious artifacts in messages and call conversations using third party threat intelligence services. Further, it employs natural language processing and machine learning techniques to examine the content of voice calls and SMS messages. It identifies suspicious elements such as keywords and phrases commonly used in phishing attacks, sensitive information as well as the context of the content.en_US
dc.identifier.conference8th International Conference in Information Technology Research 2023en_US
dc.identifier.departmentInformation Technology Research Unit, Faculty of Information Technology, University of Moratuwa.en_US
dc.identifier.emaildushan.18@itfac.mrt.ac.lken_US
dc.identifier.emailprarthana.18@itfac.mrt.ac.lken_US
dc.identifier.emailprasadi.18@itfac.mrt.ac.lken_US
dc.identifier.emailupekshag@uom.lken_US
dc.identifier.facultyITen_US
dc.identifier.pgnospp. 1-5en_US
dc.identifier.placeMoratuwa, Sri Lankaen_US
dc.identifier.proceedingProceedings of the 8th International Conference in Information Technology Research 2023en_US
dc.identifier.urihttp://dl.lib.uom.lk/handle/123/22165
dc.identifier.year2023en_US
dc.language.isoenen_US
dc.publisherInformation Technology Research Unit, Faculty of Information Technology, University of Moratuwa.en_US
dc.subjectCyber securityen_US
dc.subjectPhishingen_US
dc.subjectNatural language processingen_US
dc.subjectMachine learningen_US
dc.subjectContextual sentiment analysisen_US
dc.titleLeveraging artifact reputation analysis and contextual sentiment analysis for advanced detection of vishing and smishing attacksen_US
dc.typeConference-Full-texten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Leveraging Artifact Reputation Analysis.pdf
Size:
107.92 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections