Javascript must be enabled to continue!
Collaborative Dual-Framework Defense: CTI and LLM-Based Enhanced Smishing Detection
View through CrossRef
Smishing has become a severe cybersecurity threat. Attackers now use AI and social engineering to craft more sophisticated campaigns. To address this challenge, this study proposes a dual-layer detection framework. It combines cyber threat intelligence (CTI), machine learning, and a large language model (LLM). The framework uses 22 features built from 2,811 real SMS messages. These features are categorized as content-based, context-based, and Indicators of Compromise (IOC)-based features. Five machine learning models were evaluated. XGBoost, trained with a 70% training, 10% validation, and 20% test split, achieved the best performance. It had a recall of 92.08% and an F1-score of 94.66%. For borderline cases, the study experimented with 4 LLMs (including GPT-4o and LLaMA 3). They served as a semantic verification layer. All models achieved a recall rate above 98.5% and produced human-readable explanations. The study demonstrated that these 4 models are complementary verifiers rather than main classifiers. The results show that structured threat intelligence used during feature engineering improves machine learning model performance. With semantic reasoning, the framework also generates accessible reports for non-specialists. This lowers the barrier for effective smishing detection.
The Science and Information Organization
Title: Collaborative Dual-Framework Defense: CTI and LLM-Based Enhanced Smishing Detection
Description:
Smishing has become a severe cybersecurity threat.
Attackers now use AI and social engineering to craft more sophisticated campaigns.
To address this challenge, this study proposes a dual-layer detection framework.
It combines cyber threat intelligence (CTI), machine learning, and a large language model (LLM).
The framework uses 22 features built from 2,811 real SMS messages.
These features are categorized as content-based, context-based, and Indicators of Compromise (IOC)-based features.
Five machine learning models were evaluated.
XGBoost, trained with a 70% training, 10% validation, and 20% test split, achieved the best performance.
It had a recall of 92.
08% and an F1-score of 94.
66%.
For borderline cases, the study experimented with 4 LLMs (including GPT-4o and LLaMA 3).
They served as a semantic verification layer.
All models achieved a recall rate above 98.
5% and produced human-readable explanations.
The study demonstrated that these 4 models are complementary verifiers rather than main classifiers.
The results show that structured threat intelligence used during feature engineering improves machine learning model performance.
With semantic reasoning, the framework also generates accessible reports for non-specialists.
This lowers the barrier for effective smishing detection.
Related Results
The anatomy investigation of cavotricuspid isthmus linear ablation navigated by CARTO
The anatomy investigation of cavotricuspid isthmus linear ablation navigated by CARTO
Objective
We sought to investigate the anatomy characteristics of cavotricuspid isthmus (CTI) and its influence on linear ablation navigated by CARTO in patients ...
Exploring Large Language Models Integration in the Histopathologic Diagnosis of Skin Diseases: A Comparative Study
Exploring Large Language Models Integration in the Histopathologic Diagnosis of Skin Diseases: A Comparative Study
Abstract
Introduction
The exact manner in which large language models (LLMs) will be integrated into pathology is not yet fully comprehended. This study examines the accuracy, bene...
Automatic Smishing Detection System with Feedback Loops
Automatic Smishing Detection System with Feedback Loops
Abstract
This study delves into the escalating issue of Smishing, an emerging menace within the information security landscape spurred by the widespread use of text message...
CTI View: APT Threat Intelligence Analysis System
CTI View: APT Threat Intelligence Analysis System
With the development of advanced persistent threat (APT) and the increasingly severe situation of network security, the strategic defense idea with the concept of “active defense, ...
CIÊNCIA PARA REDUÇÃO DAS DESIGUALDADES: RELATO DE EXPERIÊNCIA DA SEMANA NACIONAL DE CIÊNCIA E TECNOLOGIA DO DISTRITO CRIATIVO DO PELOURINHO
CIÊNCIA PARA REDUÇÃO DAS DESIGUALDADES: RELATO DE EXPERIÊNCIA DA SEMANA NACIONAL DE CIÊNCIA E TECNOLOGIA DO DISTRITO CRIATIVO DO PELOURINHO
O presente artigo intitulado Semana Nacional de Ciência, Tecnologia e Inovação do Distrito Criativo do Pelourinho (SNCT Pelô): Ciência para a Redução das Desigualdades é fruto de u...
Human-AI Collaboration in Clinical Reasoning: A UK Replication and Interaction Analysis
Human-AI Collaboration in Clinical Reasoning: A UK Replication and Interaction Analysis
Abstract
Objective
A paper from Goh et al found that a large language model (LLM) working alone outperformed American clinicians assisted...
Optimasi Linear Support Vector Machine untuk Deteksi Smishing Multi-Kelas pada Dataset Tidak Seimbang
Optimasi Linear Support Vector Machine untuk Deteksi Smishing Multi-Kelas pada Dataset Tidak Seimbang
Serangan smishing (SMS phishing) menghadapi tantangan mendasar dalam deteksi berbasis machine learning akibat ketidakseimbangan distribusi kelas pada dataset dunia nyata, di mana i...
When Does a Dual Matrix Have a Dual Generalized Inverse?
When Does a Dual Matrix Have a Dual Generalized Inverse?
This paper deals with the existence of various types of dual generalized inverses of dual matrices. New and foundational results on the necessary and sufficient conditions for vari...

