Skip to main content
Log in

Telecommunication fraud resilient framework for efficient and accurate detection of SMS phishing using artificial intelligence techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

One of the telecommunications’ most popular forms of fraud is the short message service (SMS). Mobile users have a valid fear about SMS spam, which disturbs telecoms network operators since it impacts their clients and costs them money. For that, the existing research utilized an artificial intelligence approach to detect SMS phishing in telecommunication. Since SMS text data is unstructured and contains complicated, nonlinear relationships, this process could be difficult. Therefore, this research developed a Fraud Resilient Framework using Enhanced CNN-based SMS Phishing detection. Telecommunication fraud-related datasets are collected. Firstly, the data are preprocessed and cleaned using stemming, tokenization, and the TF-IDF approach. Moreover, to extract the features, the existing research utilized the information gain technique, which is time-consuming. So to overcome these flaws, this research introduces Assimilated Pearson Correlation Coefficient Principal Component Analysis (PCC-PCA) for feature extraction. This research introduces an enhanced Convolutional Neural Network (Enhanced CNN) in which, overcome the exploding gradients, this research introduces Parameterized ReLU which minimizes architecture complexity, regularizing, and early stopping. Then, the retrieved features are used in Enhanced CNN to categorize the ham and spam in the telecommunication network. As a result, when matched to cutting-edge techniques, this proposed solution offers great accuracy and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Pesudocode 1
Algorithm 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Hilas CS, Mastorocostas PA (2008) An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl-Based Syst 21(7):721–726

    Article  Google Scholar 

  2. Jain V (2017) Perspective analysis of telecommunication fraud detection using data stream analytics and neural network classification based data mining. Int J Inf Technol 9(3):303–310

    Google Scholar 

  3. Hila CS, Sahalos JN (2007) An application of decision trees for rule extraction towards telecommunications fraud detection. In Knowledge-Based Intelligent Information and Engineering Systems: 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12–14, 2007. Proceedings, Part II 11 Springer Berlin Heidelberg:1112–1121. https://link.springer.com/chapter/10.1007/978-3-540-74827-4_139

  4. Hilas CS, Kazarlis SA, Rekanos IT, Mastorocostas PA (2014) A genetic programming approach to telecommunications fraud detection and classification. In Proc. 2014 Int. Conf. Circuits, Syst. Signal Process. Commun. Comput pp 77–83. https://www.researchgate.net/profile/Constantinos-Hilas/publication/261191177_A_Genetic_Programming_Approach_to_Telecommunications_Fraud_Detection_and_Classification/links/0046353441f851ac2a000000/A-Genetic-Programming-Approach-to-Telecommunications-Fraud-Detection-and-Classification.pdf

  5. Estévez PA, Held CM, Perez CA (2006) Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. Expert Syst Appl 31(2):337–344

    Article  Google Scholar 

  6. Xu W, Pang Y, Ma J, Wang SY, Hao G, Zeng S, Qian YH (2008) Fraud detection in telecommunication: a rough fuzzy set based approach. In 2008 International Conference on Machine Learning and Cybernetics IEEE 3:1249–1253. https://doi.org/10.1109/ICMLC.2008.4620596

  7. Patel Y (2019) Cross channel fraud detection framework in financial services using recurrent neural networks (Doctoral dissertation, London Metropolitan University). https://repository.londonmet.ac.uk/id/eprint/6133

  8. Subudhi S, Panigrahi S (2016) Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks. Int J Secure Network 11(1–2):3–11

    Article  Google Scholar 

  9. Olszewski D (2012) A probabilistic approach to fraud detection in telecommunications. Knowl-Based Syst 26:246–258

    Article  Google Scholar 

  10. Zhao Q, Chen K, Li T, Yang Y, Wang X (2018) Detecting telecommunication fraud by understanding the contents of a call. Cybersecurity 1:1–12

    Article  Google Scholar 

  11. Ulfath RE, Alqahtani H, Hammoudeh M, Sarker IH (2021) Hybrid CNN-GRU framework with integrated pre-trained language transformer for SMS phishing detection. In The 5th International Conference on Future Networks & Distributed Systems pp 244–251. https://doi.org/10.1145/3508072.3508109

  12. Mishra S, Soni D (2021) Dsmishsms-a system to detect smishing sms. Neural Comput Appl 35(7):4975–4992. https://link.springer.com/article/10.1007/s00521-021-06305-y

  13. Sonowal G (2020) Detecting phishing SMS based on multiple correlation algorithms. SN Comput Sci 1(6):361

    Article  Google Scholar 

  14. Noah N, Tayachew A, Ryan S, Das S (2022) Poster: PhisherCop-An Automated Tool Using ML Classifiers for Phishing Detection. In Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022). https://doi.org/10.2139/ssrn.4096243

  15. Sadiq A, Anwar M, Butt RA, Masud F, Shahzad MK, Naseem S, Younas M (2021) A review of phishing attacks and countermeasures for internet of things-based smart business applications in industry 4.0. Human Behavior Emerg Technol 3(5):854–864

    Article  Google Scholar 

  16. Kalaharsha P, Mehtre BM (2021) Detecting Phishing Sites--An Overview. arXiv preprint arXiv:2103.12739. https://doi.org/10.48550/arXiv.2103.12739

  17. Clasen M, Li F, Williams D (2021) Friend or foe: An investigation into recipient identification of SMS-based phishing. In Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings 15 Springer International Publishing:148–163. https://doi.org/10.1007/978-3-030-81111-2_13

  18. Choudhary N, Jain AK (2018) Comparative analysis of mobile phishing detection and prevention approaches. In Information and Communication Technology for Intelligent Systems (ICTIS 2017) Springer International Publishing 1(2):349–356. https://doi.org/10.1007/978-3-319-63673-3_43

  19. Onuodu FE, Nnaa SB (2020) An enhanced fraud detection model using neural networks for telecommunications and smart cards in nigeria. London Journal Of Research In Computer Science And Technology 20(2):27

  20. Zheng YJ, Zhou XH, Sheng WG, Xue Y, Chen SY (2018) Generative adversarial network based telecom fraud detection at the receiving bank. Neural Netw 102:78–86

    Article  Google Scholar 

  21. Kashir M, Bashir S (2019) Machine learning techniques for sim box fraud detection. In 2019 International Conference on Communication Technologies (ComTech) IEEE  pp 4–8. https://doi.org/10.1109/COMTECH.2019.8737828

  22. Boukari BE, Ravi A, Msahli M (2021) Machine learning detection for smishing frauds. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC) IEE pp 1–2. https://doi.org/10.1109/CCNC49032.2021.9369640

  23. Hameed SM, Ali ZH (2021) SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization. Int J Intell Eng Syst 14(2). https://doi.org/10.22266/ijies2021.0430.28

  24. Wu T, Zheng KF, Wu CH, Wang XJ SMS Phishing detection using oversampling and feature optimization method

  25. Sjarif NNA, Yahya Y, Chuprat S, Azmi NHFM (2020) Support vector machine algorithm for SMS spam classification in the telecommunication industry. Int J Adv Sci Eng Inf Technol 10(2):635–639

    Article  Google Scholar 

  26. Kadhim AI (2018) An evaluation of preprocessing techniques for text classification. Int J Comput Sci Inf Security (IJCSIS) 16(6):22–32

    Google Scholar 

  27. Bengio Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Networks 5(2):157–166

    Article  Google Scholar 

  28. Mikolov T (2012) Statistical language models based on neural networks. Presentation at Google, Mountain View, 2nd April 80(26). https://www.fit.vutbr.cz/~imikolov/rnnlm/google.pdf

  29. Srinivasarao U, Sharaff A (2023) Machine intelligence based hybrid classifier for spam detection and sentiment analysis of SMS messages. Multimed Tools Appl 1–31. https://doi.org/10.1007/s11042-023-14641-5

  30. Oswald C, Simon SE, Bhattacharya A (2022) Spotspam: Intention analysis–driven sms spam detection using bert embeddings. ACM Transactions on the Web (TWEB) 16(3):1–27

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Devendra Sambhaji Hapase.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hapase, D.S., Patil, L.V. Telecommunication fraud resilient framework for efficient and accurate detection of SMS phishing using artificial intelligence techniques. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19020-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-19020-2

Keywords

Navigation