FRAUD NOTIFICATION DETECTOR TECHNOLOGY ON NEURAL NETWORK MODEL
DOI:
https://doi.org/10.18623/rvd.v23.6635Keywords:
Mobile Technologies, Cybersecurity, Data Protection, Information Security, FraudAbstract
This article is devoted to a comprehensive analysis of modern threats and vulnerabilities associated with text fraud in the digital environment. Both traditional rule-based signature methods and modern machine learning approaches, including zero-shot classification and hybrid architectures, are considered. The practices of social engineering, phishing, and financial fraud are analyzed to identify key patterns and markers of attackers. A lightweight system has been developed that combines the speed of rules and the semantic depth of neural network models, which has improved the detection efficiency. An important element was the risk assessment methodology, which took into account the content of messages and the context, which reduced the number of false positives to 3%, while maintaining high accuracy. The system architecture is implemented with cascade processing, which ensures optimal use of computing resources. Of particular importance is the mechanism of adaptive redistribution of weights between the components of the system, which allows you to maintain the quality of work with limited resources. A fallback classifier has been implemented to guarantee fault tolerance, maintaining accuracy in the range of 85-90%. The study highlights the need for a multi-layered approach that combines signature detection and semantic analysis. Prospects for the development of the system include expanding the rules, integrating with reputation systems, training to adapt to new fraudulent tactics, as well as creating a distributed infrastructure. Continued research in this area is important to combat evolving threats and create effective commercial solutions to protect against text fraud.
References
Addula, S. R. (2025). Mobile banking adoption: A multi-factorial study on social influence, compatibility, digital self-efficacy, and perceived cost among Generation Z consumers in the United States. Journal of Theoretical and Applied Electronic Commerce Research, 20(3), 192. https://doi.org/10.3390/jtaer20030192
Aigner, S., et al. (2024). Kotlin in action. Simon and Schuster.
Alam, M. N., Sarma, D., Lima, F. F., Saha, I., Ulfath, R.-E.-, & Hossain, S. (2020). Phishing attacks detection using machine learning approach. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1173–1179). https://doi.org/10.1109/ICSSIT48917.2020.9214225
Ceder, N. (2025). The quick Python book. Simon and Schuster.
Chimuco, F. T., et al. (2023). Secure cloud-based mobile apps: Attack taxonomy, requirements, mechanisms, tests and automation. International Journal of Information Security, 22(4), 833–867. https://doi.org/10.1007/s10207-023-00669-z
Diantoni, C., et al. (2024). Arsitektur MVVM dan framework Jetpack Compose pada pengembangan aplikasi Android. JATI (Jurnal Mahasiswa Teknik Informatika), 8(3), 3216–3224. https://doi.org/10.36040/jati.v8i3.9638
Herzallah, F., et al. (2025). Social commerce attributes, customer engagement and repurchase intention in social commerce platforms: A stimulus–organism–response approach. Journal of Open Innovation: Technology, Market, and Complexity, 100635. https://doi.org/10.1016/j.joitmc.2025.100635
Kaspersky Lab. (2024). Spam and phishing report 2024. https://securelist.ru/spam-and-phishing-report-2024/111743/
Kazakova, M. A., & Sultanova, A. P. (2022). Analysis of natural language processing technology: Modern problems and approaches. Advanced Engineering Research (Rostov-on-Don), 22(2), 169–176.
Mensah, I. K. (2022). The factors driving the consumer purchasing intentions in social commerce. IEEE Access, 10, 132332–132348. https://doi.org/10.1109/ACCESS.2022.3230629
Moallem, A. (2021). Cybersecurity, privacy, and trust. In Handbook of Human Factors and Ergonomics (pp. 1107–1120). https://doi.org/10.1002/9781119636113.ch43
Muhammad, Z., et al. (2023). Smartphone security and privacy: A survey on APTs, sensor-based attacks, side-channel attacks, Google Play attacks, and defenses. Technologies, 11(3), 76. https://doi.org/10.3390/technologies11030076
Raimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the internet of things in industrial management. Applied Sciences, 12(3), 1598. https://doi.org/10.3390/app12031598
Rodríguez, G. S. (2024). Thriving in Android Development Using Kotlin: Use the newest features of the Android framework to develop production-grade apps. Packt Publishing.
Senanayake, J., Kalutarage, H., & Al-Kadri, M. O. (2021). Android mobile malware detection using machine learning: A systematic review. Electronics, 10(13), 1606. https://doi.org/10.3390/electronics10131606
Shaukat, M. W., et al. (2023). A hybrid approach for alluring ads phishing attack detection using machine learning. Sensors, 23(19), 8070. https://doi.org/10.3390/s23198070
Yıldırım, S., & Asgari-Chenaghlu, M. (2021). Mastering transformers: Build state-of-the-art models from scratch with advanced natural language processing techniques. Packt Publishing.
Downloads
Published
How to Cite
Issue
Section
License
I (we) submit this article which is original and unpublished, of my (our) own authorship, to the evaluation of the Veredas do Direito Journal, and agree that the related copyrights will become exclusive property of the Journal, being prohibited any partial or total copy in any other part or other printed or online communication vehicle dissociated from the Veredas do Direito Journal, without the necessary and prior authorization that should be requested in writing to Editor in Chief. I (we) also declare that there is no conflict of interest between the articles theme, the author (s) and enterprises, institutions or individuals.
I (we) recognize that the Veredas do Direito Journal is licensed under a CREATIVE COMMONS LICENSE.
Licença Creative Commons Attribution 3.0


