Emoti-Shing: Detecting Vishing Attacks by Learning Emotion Dynamics through Hidden Markov Models (2024)

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

投递稿件


查看量下载量

相关文章

更多...

Journal of Intelligent Learning Systems and Applications 2024


DOI: 10.4236/jilsa.2024.163015, PP. 274-315

Virgile Simé Nyassi, Franklin Tchakounté, Blaise Omer Yenké, Duplex Elvis Houpa Danga, Magnuss Dufe Ngoran, Jean Louis Kedieng Ebongue Fendji

Keywords: Social Engineering, Hidden Markov Model, Vishing, Voice Mining

Full-TextCite this paperAdd to My Lib

Abstract:

This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more susceptible to vishing attacks. The proposed Emoti-Shing model analyzes potential victims’ emotions using Hidden Markov Models to track vishing scams by examining the emotional content of phone call audio conversations. This approach aims to detect vishing scams using biological features of humans, specifically emotions, which cannot be easily masked or spoofed. Experimental results on 30 generated emotions indicate the potential for increased vishing scam detection through this approach.

References
[1]Mitnick, K.D. and Simon, W.L. (2003) The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons.
[2]Salahdine, F. and Kaabouch, N. (2019) Social Engineering Attacks: A Survey. Future Internet, 11, Article 89.
https://doi.org/10.3390/fi11040089
[3]Yeboah-Boateng, E.O. and Amanor, P.M. (2014) Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices. Journal of Emerging Trends in Computing and Information Sciences, 5, 297-307.
[4]ANTIC (2020) Cameroon Lost XAF6 Bln to Bank Frauds in 2019 (ANTIC).
[5]Hilas, C.S., Kazarlis, S.A., Rekanos, I.T. and Mastorocostas, P.A. (2014) A Genetic Programming Approach to Telecommunications Fraud Detection and Classification. International Conference on Circuits, Systems, Signal Processing, Communications and Computers, Venice, 29 September-1 October 2014, 77-83.
[6]Lansley, M., Polatidis, N., Kapetanakis, S., Amin, K., Samakovitis, G. and Petridis, M. (2019) Seen the Villains: Detecting Social Engineering Attacks Using Case-Based Reasoning and Deep Learning. Proceedings of the ICCBR Workshops, Otzenhausen, 8-12 September 2019, 39-48.
[7]Nicholas, J. (2020) Types of Social Engineering Attacks: Detecting the Latest Scams. BioCatch.
[8]Olszewski, D. (2014) Fraud Detection Using Self-Organizing Map Visualizing the User Profiles. Knowledge-Based Systems, 70, 324-334.
https://doi.org/10.1016/j.knosys.2014.07.008
[9]Ko, M.M. and Su Thwin, M.M. (2015) Anomalous Behavior Detection in Mobile Network. Genetic and Evolutionary Computing, Yangon, 26-28 August 2015, 147-155.
https://doi.org/10.1007/978-3-319-23207-2_15
[10]Hilas, C.S., Mastorocostas, P.A. and Rekanos, I.T. (2015) Clustering of Telecommunications User Profiles for Fraud Detection and Security Enhancement in Large Corporate Networks: A Case Study. Applied Mathematics & Information Sciences, 9, 1709-1718.
[11]Subudhi, S. and Panigrahi, S. (2016) Use of Fuzzy Clustering and Support Vector Machine for Detecting Fraud in Mobile Telecommunication Networks. International Journal of Security and Networks, 11, 3-11.
https://doi.org/10.1504/ijsn.2016.075069
[12]Subudhi, S. and Panigrahi, S. (2018) A Hybrid Mobile Call Fraud Detection Model Using Optimized Fuzzy C-Means Clustering and Group Method of Data Handling-Based Network. Vietnam Journal of Computer Science, 5, 205-217.
https://doi.org/10.1007/s40595-018-0116-x
[13]Lansley, M., Mouton, F., Kapetanakis, S. and Polatidis, N. (2020) SEADer++: Social Engineering Attack Detection in Online Environments Using Machine Learning. Journal of Information and Telecommunication, 4, 346-362.
https://doi.org/10.1080/24751839.2020.1747001
[14]Hoelscher, D.M., Ranjit, N. and Pérez, A. (2017) Surveillance Systems to Track and Evaluate Obesity Prevention Efforts. Annual Review of Public Health, 38, 187-214.
https://doi.org/10.1146/annurev-publhealth-031816-044537
[15]Dasgupta, P.B. (2017) Detection and Analysis of Human Emotions through Voice and Speech Pattern Processing. arXiv preprint arXiv:1710.10198.
[16]Majumder, N., Poria, S., Hazarika, D., Mihalcea, R., Gelbukh, A. and Cambria, E. (2019) Dialoguernn: An Attentive RNN for Emotion Detection in Conversations. Proceedings of the AAAI Conference on Artificial Intelligence, 33, 6818-6825.
https://doi.org/10.1609/aaai.v33i01.33016818
[17]Liu, F. and Maitlis, S. (2013) Emotional Dynamics and Strategizing Processes: A Study of Strategic Conversations in Top Team Meetings. Journal of Management Studies, 51, 202-234.
https://doi.org/10.1111/j.1467-6486.2012.01087.x
[18]Lee, S., Lovelace, K.J. and Manz, C.C. (2014) Serving with Spirit: An Integrative Model of Workplace Spirituality within Service Organizations. Journal of Management, Spirituality & Religion, 11, 45-64.
https://doi.org/10.1080/14766086.2013.801023
[19]Lerner, J.S. and Keltner, D. (2001) Fear, Anger, and Risk. Journal of Personality and Social Psychology, 81, 146-159.
https://doi.org/10.1037//0022-3514.81.1.146
[20]Levenson, R.W. (1999) The Intrapersonal Functions of Emotion. Cognition & Emotion, 13, 481-504.
https://doi.org/10.1080/026999399379159
[21]Johnson-Laird, P.N. and Oatley, K. (1992) Basic Emotions, Rationality, and Folk Theory. Cognition and Emotion, 6, 201-223.
https://doi.org/10.1080/02699939208411069
[22]Hadnagy, C. (2010) Social Engineering: The Art of Human Hacking. John Wiley & Sons.
[23]Edwards, M., Larson, R., Green, B., Rashid, A. and Baron, A. (2017) Panning for Gold: Automatically Analysing Online Social Engineering Attack Surfaces. Computers & Security, 69, 18-34.
https://doi.org/10.1016/j.cose.2016.12.013
[24]Kalniņš, R., Puriņš, J. and Alksnis, G. (2017) Security Evaluation of Wireless Network Access Points. Applied Computer Systems, 21, 38-45.
https://doi.org/10.1515/acss-2017-0005
[25]Lunceford, B.L. (2006) Democracy and the Hacker Movement: Information Technologies and Political Action. The Pennsylvania State University.
[26]Myers, C.D. and Tingley, D. (2016) The Influence of Emotion on Trust. Political Analysis, 24, 492-500.
https://doi.org/10.1093/pan/mpw026
[27]Gupta, S., Singhal, A. and Kapoor, A. (2016) A Literature Survey on Social Engineering Attacks: Phishing Attack. 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, 29-30 April 2016, 537-540.
https://doi.org/10.1109/ccaa.2016.7813778
[28]Rabiner, L.R. (1989) A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE, 77, 257-286.
https://doi.org/10.1109/5.18626
[29]Thornburgh, T. (2004) Social Engineering. Proceedings of the 1st Annual Conference on Information Security Curriculum Development, Kennesaw, 8 October 2004, 133-135.
https://doi.org/10.1145/1059524.1059554
[30]Choi, K., Lee, J. and Chun, Y. (2017) Voice Phishing Fraud and Its Modus Operandi. Security Journal, 30, 454-466.
https://doi.org/10.1057/sj.2014.49
[31]van Gorp, T. and Adams, E. (2012) Why Design for Emotion? In: van Gorp, T. and Adams, E., Eds., Design for Emotion, Elsevier, 1-18.
https://doi.org/10.1016/b978-0-12-386531-1.00001-6
[32]Plutchik (2019) Motivation and Emotion/Book/2014/Plutchik’s Wheel of Emotions.
https://en.wikiversity.org/wiki/Motivation_and_emotion/Book/2014/Plutchik%27s_wheel_of_emotions
[33]Lee, K., Caverlee, J. and Webb, S. (2010) Uncovering Social Spammers: Social Honeypots + Machine Learning. Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, Geneva, 2010 July 19-23, 435-442.
[34]Bourgais, M., Taillandier, P., Vercouter, L. and Adam, C. (2018) Emotion Modeling in Social Simulation: A Survey. Journal of Artificial Societies and Social Simulation, 21, Article 5.
https://doi.org/10.18564/jasss.3681
[35]Zeelenberg, M., Nelissen, R.M.A., Breugelmans, S.M. and Pieters, R. (2008) On Emotion Specificity in Decision Making: Why Feeling Is for Doing. Judgment and Decision Making, 3, 18-27.
https://doi.org/10.1017/s1930297500000139
[36]Hatfield, E., Cacioppo, J.T. and Rapson, R.L. (1993) Emotional Contagion. Current Directions in Psychological Science, 2, 96-100.
https://doi.org/10.1111/1467-8721.ep10770953
[37]Kavanagh, D.J. and Bower, G.H. (1985) Mood and Self-Efficacy: Impact of Joy and Sadness on Perceived Capabilities. Cognitive Therapy and Research, 9, 507-525.
https://doi.org/10.1007/bf01173005
[38]Tähtinen, J. and Blois, K. (2011) The Involvement and Influence of Emotions in Problematic Business Relationships. Industrial Marketing Management, 40, 907-918.
https://doi.org/10.1016/j.indmarman.2011.06.030
[39]Schuller, B. and Batliner, A. (2013) Computational Paralinguistics: Emotion, Affect and Personality in Speech and Language Processing. John Wiley & Sons.
[40]Chen, A. (2019) Why Companies Want to Mine the Secrets in Your Voice: Voices Are Highly Personal, Hard to Fake, and Contain Surprising Information about Our Mental Health and Behaviors.
https://www.theverge.com/2019/3/14/18264458/voice-technology-speech-analysis-mental-health-risk-privacy
[41]Lindquist, K.A., Barrett, L.F., Bliss-Moreau, E. and Russell, J.A. (2006) Language and the Perception of Emotion. Emotion, 6, 125-138.
https://doi.org/10.1037/1528-3542.6.1.125
[42]Hazarika, D., Poria, S., Zadeh, A., Cambria, E., Morency, L. and Zimmermann, R. (2018) Conversational Memory Network for Emotion Recognition in Dyadic Dialogue Videos. Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers), New Orleans, 1-6 June 2018, 2122-2132.
https://doi.org/10.18653/v1/n18-1193
[43]Kircanski, K., Notthoff, N., DeLiema, M., Samanez-Larkin, G.R., Shadel, D., Mottola, G., et al. (2018) Emotional Arousal May Increase Susceptibility to Fraud in Older and Younger Adults. Psychology and Aging, 33, 325-337.
https://doi.org/10.1037/pag0000228
[44]Allen, K. (2017) Scammers Play on Older Adult Emotions, Study Finds.
https://www.mcablab.science/news/2017/12/21/scammers-play-on-older-adults-emotions-study-finds
[45]Russel, J. (1980) Three Dimensions of Emotion. Journal of Personality and Social Psychology, 9, 1161-1178.
[46]Cukier, W., Nesselroth, E. and Cody, S. (2007) Genre, Narrative and the “Nigerian Letter” in Electronic Mail. 2007 40th Annual Hawaii International Conference on System Sciences (HICSS07), Waikoloa, 3-6 January 2007, 70.
https://doi.org/10.1109/hicss.2007.238
[47]Pinquart, M. and Sörensen, S. (2003) Associations of Stressors and Uplifts of Caregiving with Caregiver Burden and Depressive Mood: A Meta-Analysis. The Journals of Gerontology: Series B, 58, P112-P128.
https://doi.org/10.1093/geronb/58.2.p112
[48]Iloga, S. (2019) Apprentissage a l’aide des modèles de markov cachés et applications. Université de Maroua.
[49]Li, X., Lee, T.S. and Liu, Y. (2011) Hybrid Generative-Discriminative Classification Using Posterior Divergence. CVPR 2011, Colorado Springs, 20-25 June 2011, 2713-2720.
https://doi.org/10.1109/CVPR.2011.5995584
[50]Sargant, W. (1957) Battle for the Mind. Prabhat Prakashan.
[51]Halton, C. (2019) Emotional Neutrality: What It Is, How It Works, Example.
https://www.investopedia.com/terms/e/emotional-neutrality.asp
[52]Kantzavelou, I. and Katsikas, S. (2010) A Game-Based Intrusion Detection Mechanism to Confront Internal Attackers. Computers & Security, 29, 859-874.
https://doi.org/10.1016/j.cose.2010.06.002

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

Emoti-Shing: Detecting Vishing Attacks by Learning Emotion Dynamics through Hidden Markov Models (1)

WhatsApp +8615387084133

WeChat 1538708413

Emoti-Shing: Detecting Vishing Attacks by Learning Emotion Dynamics through Hidden Markov Models (2024)
Top Articles
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated:

Views: 6262

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.