This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more susceptible to vishing attacks. The proposed Emoti-Shing model analyzes potential victims’ emotions using Hidden Markov Models to track vishing scams by examining the emotional content of phone call audio conversations. This approach aims to detect vishing scams using biological features of humans, specifically emotions, which cannot be easily masked or spoofed. Experimental results on 30 generated emotions indicate the potential for increased vishing scam detection through this approach.
References
[1]
Mitnick, K.D. and Simon, W.L. (2003) The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons.
[2]
Salahdine, F. and Kaabouch, N. (2019) Social Engineering Attacks: A Survey. FutureInternet, 11, Article 89. https://doi.org/10.3390/fi11040089
[3]
Yeboah-Boateng, E.O. and Amanor, P.M. (2014) Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices. JournalofEmergingTrendsinComputingandInformationSciences, 5, 297-307.
[4]
ANTIC (2020) Cameroon Lost XAF6 Bln to Bank Frauds in 2019 (ANTIC).
[5]
Hilas, C.S., Kazarlis, S.A., Rekanos, I.T. and Mastorocostas, P.A. (2014) A Genetic Programming Approach to Telecommunications Fraud Detection and Classification. International Conference on Circuits, Systems, Signal Processing, Communications and Computers, Venice, 29 September-1 October 2014, 77-83.
[6]
Lansley, M., Polatidis, N., Kapetanakis, S., Amin, K., Samakovitis, G. and Petridis, M. (2019) Seen the Villains: Detecting Social Engineering Attacks Using Case-Based Reasoning and Deep Learning. Proceedings of the ICCBR Workshops, Otzenhausen, 8-12 September 2019, 39-48.
[7]
Nicholas, J. (2020) Types of Social Engineering Attacks: Detecting the Latest Scams. BioCatch.
[8]
Olszewski, D. (2014) Fraud Detection Using Self-Organizing Map Visualizing the User Profiles. Knowledge-BasedSystems, 70, 324-334. https://doi.org/10.1016/j.knosys.2014.07.008
[9]
Ko, M.M. and Su Thwin, M.M. (2015) Anomalous Behavior Detection in Mobile Network. Genetic and Evolutionary Computing, Yangon, 26-28 August 2015, 147-155. https://doi.org/10.1007/978-3-319-23207-2_15
[10]
Hilas, C.S., Mastorocostas, P.A. and Rekanos, I.T. (2015) Clustering of Telecommunications User Profiles for Fraud Detection and Security Enhancement in Large Corporate Networks: A Case Study. AppliedMathematics&InformationSciences, 9, 1709-1718.
[11]
Subudhi, S. and Panigrahi, S. (2016) Use of Fuzzy Clustering and Support Vector Machine for Detecting Fraud in Mobile Telecommunication Networks. InternationalJournalofSecurityandNetworks, 11, 3-11. https://doi.org/10.1504/ijsn.2016.075069
[12]
Subudhi, S. and Panigrahi, S. (2018) A Hybrid Mobile Call Fraud Detection Model Using Optimized Fuzzy C-Means Clustering and Group Method of Data Handling-Based Network. VietnamJournalofComputerScience, 5, 205-217. https://doi.org/10.1007/s40595-018-0116-x
[13]
Lansley, M., Mouton, F., Kapetanakis, S. and Polatidis, N. (2020) SEADer++: Social Engineering Attack Detection in Online Environments Using Machine Learning. JournalofInformationandTelecommunication, 4, 346-362. https://doi.org/10.1080/24751839.2020.1747001
[14]
Hoelscher, D.M., Ranjit, N. and Pérez, A. (2017) Surveillance Systems to Track and Evaluate Obesity Prevention Efforts. AnnualReviewofPublicHealth, 38, 187-214. https://doi.org/10.1146/annurev-publhealth-031816-044537
[15]
Dasgupta, P.B. (2017) Detection and Analysis of Human Emotions through Voice and Speech Pattern Processing. arXiv preprint arXiv:1710.10198.
[16]
Majumder, N., Poria, S., Hazarika, D., Mihalcea, R., Gelbukh, A. and Cambria, E. (2019) Dialoguernn: An Attentive RNN for Emotion Detection in Conversations. ProceedingsoftheAAAIConferenceonArtificialIntelligence, 33, 6818-6825. https://doi.org/10.1609/aaai.v33i01.33016818
[17]
Liu, F. and Maitlis, S. (2013) Emotional Dynamics and Strategizing Processes: A Study of Strategic Conversations in Top Team Meetings. JournalofManagementStudies, 51, 202-234. https://doi.org/10.1111/j.1467-6486.2012.01087.x
[18]
Lee, S., Lovelace, K.J. and Manz, C.C. (2014) Serving with Spirit: An Integrative Model of Workplace Spirituality within Service Organizations. JournalofManagement,Spirituality&Religion, 11, 45-64. https://doi.org/10.1080/14766086.2013.801023
[19]
Lerner, J.S. and Keltner, D. (2001) Fear, Anger, and Risk. JournalofPersonalityandSocialPsychology, 81, 146-159. https://doi.org/10.1037//0022-3514.81.1.146
[20]
Levenson, R.W. (1999) The Intrapersonal Functions of Emotion. Cognition&Emotion, 13, 481-504. https://doi.org/10.1080/026999399379159
[21]
Johnson-Laird, P.N. and Oatley, K. (1992) Basic Emotions, Rationality, and Folk Theory. CognitionandEmotion, 6, 201-223. https://doi.org/10.1080/02699939208411069
[22]
Hadnagy, C. (2010) Social Engineering: The Art of Human Hacking. John Wiley & Sons.
[23]
Edwards, M., Larson, R., Green, B., Rashid, A. and Baron, A. (2017) Panning for Gold: Automatically Analysing Online Social Engineering Attack Surfaces. Computers&Security, 69, 18-34. https://doi.org/10.1016/j.cose.2016.12.013
[24]
Kalniņš, R., Puriņš, J. and Alksnis, G. (2017) Security Evaluation of Wireless Network Access Points. AppliedComputerSystems, 21, 38-45. https://doi.org/10.1515/acss-2017-0005
[25]
Lunceford, B.L. (2006) Democracy and the Hacker Movement: Information Technologies and Political Action. The Pennsylvania State University.
[26]
Myers, C.D. and Tingley, D. (2016) The Influence of Emotion on Trust. PoliticalAnalysis, 24, 492-500. https://doi.org/10.1093/pan/mpw026
[27]
Gupta, S., Singhal, A. and Kapoor, A. (2016) A Literature Survey on Social Engineering Attacks: Phishing Attack. 2016 InternationalConferenceonComputing,CommunicationandAutomation (ICCCA), Greater Noida, 29-30 April 2016, 537-540. https://doi.org/10.1109/ccaa.2016.7813778
[28]
Rabiner, L.R. (1989) A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. ProceedingsoftheIEEE, 77, 257-286. https://doi.org/10.1109/5.18626
[29]
Thornburgh, T. (2004) Social Engineering. Proceedingsofthe 1st Annual Conference onInformation Security Curriculum Development, Kennesaw, 8 October 2004, 133-135. https://doi.org/10.1145/1059524.1059554
[30]
Choi, K., Lee, J. and Chun, Y. (2017) Voice Phishing Fraud and Its Modus Operandi. SecurityJournal, 30, 454-466. https://doi.org/10.1057/sj.2014.49
[31]
van Gorp, T. and Adams, E. (2012) Why Design for Emotion? In: van Gorp, T. and Adams, E., Eds., DesignforEmotion, Elsevier, 1-18. https://doi.org/10.1016/b978-0-12-386531-1.00001-6
[32]
Plutchik (2019) Motivation and Emotion/Book/2014/Plutchik’s Wheel of Emotions. https://en.wikiversity.org/wiki/Motivation_and_emotion/Book/2014/Plutchik%27s_wheel_of_emotions
[33]
Lee, K., Caverlee, J. and Webb, S. (2010) Uncovering Social Spammers: Social Honeypots + Machine Learning. Proceedingsofthe 33rd International ACMSIGIR Conference onResearchand Development in Information Retrieval, Geneva, 2010 July 19-23, 435-442.
[34]
Bourgais, M., Taillandier, P., Vercouter, L. and Adam, C. (2018) Emotion Modeling in Social Simulation: A Survey. JournalofArtificialSocietiesandSocialSimulation, 21, Article 5. https://doi.org/10.18564/jasss.3681
[35]
Zeelenberg, M., Nelissen, R.M.A., Breugelmans, S.M. and Pieters, R. (2008) On Emotion Specificity in Decision Making: Why Feeling Is for Doing. JudgmentandDecisionMaking, 3, 18-27. https://doi.org/10.1017/s1930297500000139
[36]
Hatfield, E., Cacioppo, J.T. and Rapson, R.L. (1993) Emotional Contagion. CurrentDirectionsinPsychologicalScience, 2, 96-100. https://doi.org/10.1111/1467-8721.ep10770953
[37]
Kavanagh, D.J. and Bower, G.H. (1985) Mood and Self-Efficacy: Impact of Joy and Sadness on Perceived Capabilities. CognitiveTherapyandResearch, 9, 507-525. https://doi.org/10.1007/bf01173005
[38]
Tähtinen, J. and Blois, K. (2011) The Involvement and Influence of Emotions in Problematic Business Relationships. Industrial Marketing Management, 40, 907-918. https://doi.org/10.1016/j.indmarman.2011.06.030
[39]
Schuller, B. and Batliner, A. (2013) Computational Paralinguistics: Emotion, Affect and Personality in Speech and Language Processing. John Wiley & Sons.
[40]
Chen, A. (2019) Why Companies Want to Mine the Secrets in Your Voice: Voices Are Highly Personal, Hard to Fake, and Contain Surprising Information about Our Mental Health and Behaviors. https://www.theverge.com/2019/3/14/18264458/voice-technology-speech-analysis-mental-health-risk-privacy
[41]
Lindquist, K.A., Barrett, L.F., Bliss-Moreau, E. and Russell, J.A. (2006) Language and the Perception of Emotion. Emotion, 6, 125-138. https://doi.org/10.1037/1528-3542.6.1.125
[42]
Hazarika, D., Poria, S., Zadeh, A., Cambria, E., Morency, L. and Zimmermann, R. (2018) Conversational Memory Network for Emotion Recognition in Dyadic Dialogue Videos. Proceedingsofthe 2018 ConferenceoftheNorthAmericanChapteroftheAssociationforComputationalLinguistics: HumanLanguageTechnologies, Volume 1 (LongPapers), New Orleans, 1-6 June 2018, 2122-2132. https://doi.org/10.18653/v1/n18-1193
[43]
Kircanski, K., Notthoff, N., DeLiema, M., Samanez-Larkin, G.R., Shadel, D., Mottola, G., etal. (2018) Emotional Arousal May Increase Susceptibility to Fraud in Older and Younger Adults. PsychologyandAging, 33, 325-337. https://doi.org/10.1037/pag0000228
[44]
Allen, K. (2017) Scammers Play on Older Adult Emotions, Study Finds. https://www.mcablab.science/news/2017/12/21/scammers-play-on-older-adults-emotions-study-finds
[45]
Russel, J. (1980) Three Dimensions of Emotion. Journal of Personality and Social Psychology, 9, 1161-1178.
[46]
Cukier, W., Nesselroth, E. and Cody, S. (2007) Genre, Narrative and the “Nigerian Letter” in Electronic Mail. 2007 40thAnnualHawaiiInternationalConferenceonSystemSciences (HICSS’07), Waikoloa, 3-6 January 2007, 70. https://doi.org/10.1109/hicss.2007.238
[47]
Pinquart, M. and Sörensen, S. (2003) Associations of Stressors and Uplifts of Caregiving with Caregiver Burden and Depressive Mood: A Meta-Analysis. TheJournalsofGerontology: SeriesB, 58, P112-P128. https://doi.org/10.1093/geronb/58.2.p112
[48]
Iloga, S. (2019) Apprentissage a l’aide des modèles de markov cachés et applications. Université de Maroua.
[49]
Li, X., Lee, T.S. and Liu, Y. (2011) Hybrid Generative-Discriminative Classification Using Posterior Divergence. CVPR 2011, Colorado Springs, 20-25 June 2011, 2713-2720. https://doi.org/10.1109/CVPR.2011.5995584
[50]
Sargant, W. (1957) Battle for the Mind. Prabhat Prakashan.
[51]
Halton, C. (2019) Emotional Neutrality: What It Is, How It Works, Example. https://www.investopedia.com/terms/e/emotional-neutrality.asp
[52]
Kantzavelou, I. and Katsikas, S. (2010) A Game-Based Intrusion Detection Mechanism to Confront Internal Attackers. Computers&Security, 29, 859-874. https://doi.org/10.1016/j.cose.2010.06.002