Identifying and Evaluating the Best Machine Learning Predictive Models for Detecting Voice (Phone-Call) Vishing Attacks on MoMo Users in Real Time
DOI:
https://doi.org/10.70619/vol5iss6pp34-43Keywords:
Machine Learning, Predictive Models, Phishing Detection, Voice Phishing (Vishing), Mobile Money (MoMo) Fraud, Real-Time Detection, Feature Engineering, Neural Networks (CNN, LSTM), RwandaAbstract
Phishing, particularly voice-based phishing (vishing), has become a significant security threat, exploiting human trust and the widespread use of mobile communication. This paper aims to develop and evaluate a hybrid model that combines Gradient Boosting and Convolutional Neural Networks (CNNs) for detecting phishing calls in audio data. The hybrid model leverages the strengths of Gradient Boosting, a powerful classification technique, and CNNs, which excel at extracting features from raw audio signals. To assess the model’s effectiveness, a dataset comprising 40 phishing audio files and 40 legitimate audio files was used. The audio data was converted into spectrograms for CNN training. Experimental results indicate that the hybrid approach outperforms individual models such as Gradient Boosting and CNNs, assessing performance based on precision, recall, accuracy, and ROC AUC. The model specifically achieved an accuracy of 70.83%, with 67% precision for phishing calls and 75% precision for legitimate calls. By combining traditional machine learning with deep learning, this study presents an innovative approach to phishing detection. The findings highlight the effectiveness of integrating advanced feature extraction methods with robust classification techniques to enhance security in mobile money platforms. The proposed hybrid model offers a promising solution for real-time vishing detection, with potential applications in securing financial transactions and improving fraud prevention mechanisms.
References
Alshehri, A., Dahman, M., Assiri, M., Alshehri, A., Alqahtani, S., Shaiban, M., ... & Saeed, A. (2024, Sep_Dec). A decision support system based on classification algorithms for the diagnosis of periodontal diseases. Saudi Journal of Oral Science, 11(3).
Alshehri, Abdulrahman; Dahman, Mohammed; Assiri, Mousa1; Alshehri, Abdulkarim; Alqahtani, Sharifah; Shaiban, Mohammed; Alqahtani, Bashyer; Althbyani, Sabah; Alhefdi, Hatem; Hakami, Khalid; Ali, Abdulbari; Saeed, Abdullah. ( 2024, Sep–Dec). A decision support system based on classification algorithms for the diagnosis of periodontal disease. Saudi Journal of Oral Sciences 11(3). doi:10.4103/sjoralsci.sjoralsci_50_24
Figueiredo, J., Carvalho, A., Castro, D., Gonçalves, D., & Santos, N. (2024). On the Feasibility of Fully AI-automated Vishing Attacks. arXiv. doi:preprint arXiv:2409.13793
Ghafir, I., Saleem, J., Hammoudeh, M., Faour, H., Prenosil, V., Jaf, S., ... & Baker, T. (2018). Security threats to critical infrastructure: the human factor. The Journal of Supercomputing, 74, 4986–5002.
Jones, K. S., Armstrong, M. E., Tornblad, M. K., & Siami Namin, A. (2021). How social engineers use persuasion principles during vishing attacks. Information & Computer Security, 29(2), 314–331.
Liu, X., Sahidullah, M., & Kinnunen, T. (2021). Optimizing multi-taper features for deep speaker verification. IEEE Signal Processing Letters, 2187-2191, 2187-2191.
Mouton, F., Leenen, L., & Venter, H. S. (2016). Social engineering attack examples, templates, and scenarios. Computers & Security, 59, 186–209.
Yeboah-Boateng, E. O., & Amanor, P. M. (2014). Phishing, smishing & vishing: an assessment of threats against mobile devices. Journal of Emerging Trends in Computing and Information, 5(4), 297–307.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Asgedom Zerue Tlahun, Djuma Sumbiri, Dr. KN Jonathan

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.