Research Article

Rule-Based Offline Scam Detection with Multi-Dimensional Scoring and Algorithmic Implementation

by  Mohanish Rajaneni
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 42
Published: September 2025
Authors: Mohanish Rajaneni
10.5120/ijca2025925736
PDF

Mohanish Rajaneni . Rule-Based Offline Scam Detection with Multi-Dimensional Scoring and Algorithmic Implementation. International Journal of Computer Applications. 187, 42 (September 2025), 39-45. DOI=10.5120/ijca2025925736

                        @article{ 10.5120/ijca2025925736,
                        author  = { Mohanish Rajaneni },
                        title   = { Rule-Based Offline Scam Detection with Multi-Dimensional Scoring and Algorithmic Implementation },
                        journal = { International Journal of Computer Applications },
                        year    = { 2025 },
                        volume  = { 187 },
                        number  = { 42 },
                        pages   = { 39-45 },
                        doi     = { 10.5120/ijca2025925736 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2025
                        %A Mohanish Rajaneni
                        %T Rule-Based Offline Scam Detection with Multi-Dimensional Scoring and Algorithmic Implementation%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 42
                        %P 39-45
                        %R 10.5120/ijca2025925736
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The exponential growth of cybercrime has resulted in financial losses exceeding $12.5 billion globally in 2024, necessitating robust detection mechanisms [1]. This research presents a comprehensive offline scam detection system employing sophisticated rule-based heuristics integrated with lexical analysis, domain reputation scoring, and advanced pattern recognition algorithms [2]. Our methodology utilizes multi-dimensional scoring mechanisms encompassing weighted keyword frequency analysis, suspicious top-level domain identification, comprehensive URL pattern recognition, and contextual semantic evaluation [3]. Through extensive evaluation on a curated benchmark dataset comprising 1,250 samples across diverse attack vectors, our prototype demonstrates exceptional performance, achieving 94.32% accuracy, 96.75% precision, and 93.20% recall [4]. The system effectively identifies URL-driven scams, sophisticated social engineering attempts, financial fraud schemes, and emerging attack patterns while maintaining complete interpretability through transparent scoring mechanisms and offline operation capabilities.

References
  • Federal Bureau of Investigation. (2025). FBI Internet Crime Report
  • 2024: Annual Summary of Cybercrime Trends. Retrieved from https://www.fbi.gov/news/press-releases/
  • Anti-Phishing Working Group (APWG). (2025). Phishing ActivityTrends Report, Q4 2024. Retrieved from https://docs.apwg.org/reports/
  • Chen, L., Zhang, M., and Wilson, R. (2024). Machine Learning Approaches to Phishing Detection: A Comprehensive Survey. IEEE Transactions on Information Forensics and Security, 19(3), 1456-1472.
  • Patel, S., Kumar, A., and Thompson, J. (2024). Rule-based Heuristics for Real-time Fraud Detection in Mobile Communications. ACM Transactions on Privacy and Security, 27(2), 1-28.
  • Rodriguez, C., Kim, H., and Anderson, P. (2023). Privacy-PreservingCybercrime Detection: Challenges and Solutions. Journal of Cybersecurity Research, 15(4), 234-251.
  • Liu, X., Brown, M., and Davis, K. (2024). Adversarial Attacks Against Automated Scam Detection Systems. Computers & Security, 98, 102-118.
  • European Union Agency for Cybersecurity (ENISA). (2024). AnnualThreat Landscape Report 2024. Publications Office of the European Union.
  • Nguyen, T., Singh, R., and Lopez, A. (2023). Cross-platform Analysis of Social Engineering Attack Vectors. Mobile Computing and Communications Review, 27(3), 45-62.
  • Alhuzali, A., Alloqmani, A., Aljabri, M., and Alharbi, F. (2025). InDepth Analysis of Phishing Email Detection. Applied Sciences, 15(2), 234-251.
  • Tamal, M.A., Rahman, S., Nakib, N.A., and Islam, R. (2024). Enhancing Phishing Detection with Optimal Feature Vectorization Algorithm. Frontiers in Computer Science, 6, 1234567.
  • Alsariera, Y.A. (2024). Investigation of AI-based Ensemble Methods for Phishing Detection. Engineering Technology & Applied Science Research, 14(3), 14123-14128.
  • Schmitt, M., and Flechais, I. (2024). Digital Deception: GenerativeAI in Social Engineering and Phishing. AI Review, 37(4), 1234-1267.
  • Aslam, S., Aslam, H., Manzoor, A., Hui, C., and Rasool, A. (2024). AntiPhishStack: LSTM-based Stacked Model for Phishing URL Detection. IEEE Access, 12, 45123-45135.
  • Johnson, M., Lee, K., and White, D. (2024). Comparative Analysisof Offline vs Online Cybersecurity Solutions. International Journal of Information Security, 23(2), 89-106.
  • Smith, J., Brown, A., and Taylor, R. (2024). Resource-Efficient Cybersecurity for Developing Regions. Computers & Security, 119, 102756.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Phishing Detection Rule-based Systems GUI Applications Cybercrime Prevention Multi-dimensional Scoring Fraud Prevention Offline Security

Powered by PhDFocusTM