Acoustic signature analysis for distinguishing human vs. synthetic voices in vishing attacks

dc.contributor.authorGamage, P
dc.contributor.authorDissanayake, D
dc.contributor.authorKumarasinghe, N
dc.contributor.authorGanegoda, GU
dc.contributor.editorPiyatilake, ITS
dc.contributor.editorThalagala, PD
dc.contributor.editorGanegoda, GU
dc.contributor.editorThanuja, ALARR
dc.contributor.editorDharmarathna, P
dc.date.accessioned2024-02-05T13:18:32Z
dc.date.available2024-02-05T13:18:32Z
dc.date.issued2023-12-07
dc.description.abstractCybercrimes targeting mobile devices are on the rise, with vishing and smishing attacks being particularly prevalent. These attacks exploit social engineering techniques to manipulate individuals into divulging personal information or engaging in unintended actions. To counter this evolving threat landscape, this research proposes a pioneering methodology rooted in voice feature analysis. By distinguishing between human and robotic voices, this approach aims to discern legitimate calls from potential scams, thereby mitigating the associated financial losses and reputational damage. The research delves into the intricacies of voice feature analysis, leveraging natural language processing (NLP) and machine learning (ML) techniques to extract and analyze audio attributes such as pitch, volume, and temporal patterns. The ultimate objective is to create a binary classification model that accurately differentiates between human voice calls and robocalls, incorporating a comprehensive dataset comprising actual call recordings and synthesized scenarios. This research advances beyond conventional practices by championing a holistic analysis of both human and robocalls, contrary to the prevalent assumption of robocalls exclusively constituting scams. The application of various audio features, coupled with nuanced weightage allocation, enhances the model’s discernment capabilities. The resultant binary classifier is an exemplar of the innovative fusion of technology and human expertise. In conclusion, this research introduces a novel dimension to the combat against vishing and smishing attacks, with a robust voice feature analysis methodology capable of accurately identifying human and robotic voices. By effectively distinguishing legitimate calls from potential threats, this approach presents a promising avenue for safeguarding individuals and organizations against the far-reaching consequences of cybercrimes. The comprehensive analysis, validation, and insights presented in this paper contribute significantly to the field of cybersecurity and voicebased communication analysis.en_US
dc.identifier.conference8th International Conference in Information Technology Research 2023en_US
dc.identifier.departmentInformation Technology Research Unit, Faculty of Information Technology, University of Moratuwa.en_US
dc.identifier.emailprarthana.18@itfac.mrt.ac.lken_US
dc.identifier.emaildushan.18@itfac.mrt.ac.lken_US
dc.identifier.emailprasadi.18@itfac.mrt.ac.lken_US
dc.identifier.emailupekshag@uom.lken_US
dc.identifier.facultyITen_US
dc.identifier.pgnospp. 1-6en_US
dc.identifier.placeMoratuwa, Sri Lankaen_US
dc.identifier.proceedingProceedings of the 8th International Conference in Information Technology Research 2023en_US
dc.identifier.urihttp://dl.lib.uom.lk/handle/123/22167
dc.identifier.year2023en_US
dc.language.isoenen_US
dc.publisherInformation Technology Research Unit, Faculty of Information Technology, University of Moratuwa.en_US
dc.subjectCyber securityen_US
dc.subjectvishingen_US
dc.subjectExtractionen_US
dc.subjectAudio feature analysisen_US
dc.subjectClassification modelen_US
dc.titleAcoustic signature analysis for distinguishing human vs. synthetic voices in vishing attacksen_US
dc.typeConference-Full-texten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Acoustic Signature Analysis for Distinguishing.pdf
Size:
268.75 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections