Scam Detection Assistant: Automated Protection from Scammers

被引:1
作者
Kim, Myeongsoo [1 ]
Song, Changheon [2 ]
Kim, Hyeji [1 ]
Park, Deahyun [1 ]
Kwon, Yeeji [3 ]
Namkung, Eun [1 ]
Harris, Ian G. [4 ]
Carlsson, Marcel [5 ]
机构
[1] Kookmin Univ, Seoul, South Korea
[2] Seoul Natl Univ, Seoul, South Korea
[3] Seoul Womens Univ, Seoul, South Korea
[4] Univ Calif Irvine, Irvine, CA USA
[5] Lootcore, Kristianstad, Sweden
来源
2019 FIRST INTERNATIONAL CONFERENCE ON SOCIETAL AUTOMATION (SA) | 2019年
基金
美国国家科学基金会;
关键词
D O I
10.1109/sa47457.2019.8938036
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scams, also known as social engineering attacks, are an extremely common and dangerous threat today. Scams typically result in financial loss by convincing a victim to perform an ill-advised action such as sending money, or convincing him to provide private information. In this paper we present an approach to detect scams, focusing on scams which are conveyed in-person, over the phone, or via text/chat message. We present a tool called Scam Detection Assistant (SDA) which analyzes attack content to detect inappropriate statements which are indicative of social engineering attacks. A great deal of previous research in the detection of scams focuses on the detection of email scams, phishing emails. Previous work relies heavily on the analysis of various metadata specific to the email attack vector, including header information and URL links. SDA is novel compared to previous work because it focuses on the natural language contained in the attack, performing semantic analysis of the content to detect malicious intent. Focusing on content analysis makes our approach applicable to detect scams using non-email attack vectors, including texting applications, chat applications, and phone/in-person attacks which have been converted to text using a speech-to-text application.
引用
收藏
页数:8
相关论文
共 24 条
[1]  
[Anonymous], 2013, P ACL
[2]  
Bakhshi T., 2008, Human Aspects of Information Security and Assurance (HAISA)
[3]  
Bezuidenhout M., 2010, INFORM SECURITY S AF
[4]  
CHEN J, 2006, 1 INT C COMM NETW CH
[5]   EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails [J].
Duman, Sevtap ;
Cakmakci, Kubra Kalkan ;
Egele, Manuel ;
Robertson, William ;
Kirda, Engin .
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, :408-416
[6]  
Garera S, 2007, WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, P1
[7]  
Gragg D., 2002, MULTILEVEL DEFENSE S
[8]  
Greening T., 1996, SIGSAC REV, V14
[9]  
Hadnagy C., 2011, Social Engineering: The Art of Human Hacking
[10]  
Hadnagy C., 2010, Social Engineering: The Art of Human Hacking