dc.contributor.author |
Dissanayake, D |
|
dc.contributor.author |
Gamage, P |
|
dc.contributor.author |
Kumarasinghe, N |
|
dc.contributor.author |
Ganegoda, GU |
|
dc.contributor.editor |
Piyatilake, ITS |
|
dc.contributor.editor |
Thalagala, PD |
|
dc.contributor.editor |
Ganegoda, GU |
|
dc.contributor.editor |
Thanuja, ALARR |
|
dc.contributor.editor |
Dharmarathna, P |
|
dc.date.accessioned |
2024-02-05T13:05:36Z |
|
dc.date.available |
2024-02-05T13:05:36Z |
|
dc.date.issued |
2023-12-07 |
|
dc.identifier.uri |
http://dl.lib.uom.lk/handle/123/22165 |
|
dc.description.abstract |
The rise of advanced mobile technology has brought
about the widespread presence of mobile devices in our society.
These portable and versatile gadgets have become essential items
for individuals due to their convenience and capabilities. As
technology continues to play a pivotal role in modern life, an evergrowing
number of people rely on mobile devices for almost all
life activities including crucial financial activities and business
routines. However, the increasing popularity of mobile devices
has also exposed users to a heightened risk of falling victim to
fraudulent schemes. Perpetrators have been exploiting mobile
users by pretending to present authentic and legitimate requests
and opportunities, leading to the divulgence of personal and
sensitive information. These deceitful activities have seen a significant
increase, affecting individuals of various ages, educational
backgrounds, and levels of technological literacy. Additionally,
malicious actors employ advanced methods to conceal their
identities, making it challenging to prevent and counter these
attacks. Two prevalent yet under-addressed issues in this context
are vishing and smishing. This research study introduces a
system designed to detect vishing and smishing attempts more
accurately. The system analyzes the reputation of suspicious
artifacts in messages and call conversations using third party
threat intelligence services. Further, it employs natural language
processing and machine learning techniques to examine the
content of voice calls and SMS messages. It identifies suspicious
elements such as keywords and phrases commonly used in
phishing attacks, sensitive information as well as the context of
the content. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa. |
en_US |
dc.subject |
Cyber security |
en_US |
dc.subject |
Phishing |
en_US |
dc.subject |
Natural language processing |
en_US |
dc.subject |
Machine learning |
en_US |
dc.subject |
Contextual sentiment analysis |
en_US |
dc.title |
Leveraging artifact reputation analysis and contextual sentiment analysis for advanced detection of vishing and smishing attacks |
en_US |
dc.type |
Conference-Full-text |
en_US |
dc.identifier.faculty |
IT |
en_US |
dc.identifier.department |
Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa. |
en_US |
dc.identifier.year |
2023 |
en_US |
dc.identifier.conference |
8th International Conference in Information Technology Research 2023 |
en_US |
dc.identifier.place |
Moratuwa, Sri Lanka |
en_US |
dc.identifier.pgnos |
pp. 1-5 |
en_US |
dc.identifier.proceeding |
Proceedings of the 8th International Conference in Information Technology Research 2023 |
en_US |
dc.identifier.email |
dushan.18@itfac.mrt.ac.lk |
en_US |
dc.identifier.email |
prarthana.18@itfac.mrt.ac.lk |
en_US |
dc.identifier.email |
prasadi.18@itfac.mrt.ac.lk |
en_US |
dc.identifier.email |
upekshag@uom.lk |
en_US |