International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 187 - Issue 42 |
Published: September 2025 |
Authors: Mohanish Rajaneni |
![]() |
Mohanish Rajaneni . Rule-Based Offline Scam Detection with Multi-Dimensional Scoring and Algorithmic Implementation. International Journal of Computer Applications. 187, 42 (September 2025), 39-45. DOI=10.5120/ijca2025925736
@article{ 10.5120/ijca2025925736, author = { Mohanish Rajaneni }, title = { Rule-Based Offline Scam Detection with Multi-Dimensional Scoring and Algorithmic Implementation }, journal = { International Journal of Computer Applications }, year = { 2025 }, volume = { 187 }, number = { 42 }, pages = { 39-45 }, doi = { 10.5120/ijca2025925736 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2025 %A Mohanish Rajaneni %T Rule-Based Offline Scam Detection with Multi-Dimensional Scoring and Algorithmic Implementation%T %J International Journal of Computer Applications %V 187 %N 42 %P 39-45 %R 10.5120/ijca2025925736 %I Foundation of Computer Science (FCS), NY, USA
The exponential growth of cybercrime has resulted in financial losses exceeding $12.5 billion globally in 2024, necessitating robust detection mechanisms [1]. This research presents a comprehensive offline scam detection system employing sophisticated rule-based heuristics integrated with lexical analysis, domain reputation scoring, and advanced pattern recognition algorithms [2]. Our methodology utilizes multi-dimensional scoring mechanisms encompassing weighted keyword frequency analysis, suspicious top-level domain identification, comprehensive URL pattern recognition, and contextual semantic evaluation [3]. Through extensive evaluation on a curated benchmark dataset comprising 1,250 samples across diverse attack vectors, our prototype demonstrates exceptional performance, achieving 94.32% accuracy, 96.75% precision, and 93.20% recall [4]. The system effectively identifies URL-driven scams, sophisticated social engineering attempts, financial fraud schemes, and emerging attack patterns while maintaining complete interpretability through transparent scoring mechanisms and offline operation capabilities.