Role of Artificial Intelligence in the Detection of Social Engineering Attacks
DOI:
https://doi.org/10.47672/ejt.2790Abstract
Purpose: Social engineering attacks are a major concern in cybersecurity, leveraging human psychology to access sensitive information or systems without authorization. Phishing, Chief Executive Officer (CEO) scams, and deep-fake impersonation have resulted in enormous financial and reputational loss to organizations globally. All these have proved conventional security systems to be inadequate in countering the highly developed and targeted methods used by cybercriminals. This paper therefore highlights the potentials of Artificial Intelligence (AI) to improve the detection and prevention of social engineering attacks.
Materials and Methods: Popular real-life cases were subjected to critical analysis together with AI tools such as Predictive analytics, AI powered voice, in addition to Multi-modal detection and Natural Language Processing based (NLP-based) fraud detection.
Findings: AI tools were seen to have prevented and provided complete defense against social engineering attacks. Predictive analytics permits pre-emptive detection of threats, with the potential to anticipate attacks and eliminate them before they are launched. Multi-modal detection systems, including NLP to analyze email phishing and voice forensics to detect synthesized voices by probing several communication avenues together.
Unique Contribution to Theory, Practice and Policy: This paper explores how integrating behavioral science with AI-driven detection systems can help organizations identify psychologically targeted threats, implement adaptive threat detection and strengthen security frameworks through intelligent preventive strategies.
This paper also illustrates how the integration of AI in cybersecurity systems enables organizations adopt more adaptive and proactive security postures, thereby countering social engineering threats and enhancing overall security resilience.
Downloads
References
[1] Wang, Z., Sun, L., & Zhu, H. (2020). Defining social engineering in cybersecurity. IEEe Access, 8, 85094–85115.s
[2] Dalmiere, A., Nicomette, V., Auriol, G., & Marchand, P. (2025). A classification of manipulation technique used in social engineering attacks and underlying cognitive biases, needs, norms, and emotions. https://hal.science/hal-05027416/
[3] Hadnagy, C. (2010). Social engineering: The art of human hacking. John Wiley & Sons. https://books.google.com/books?hl=en&lr=&id=9LpawpklYogC&oi=fnd&pg=PR13&dq=Hadnagy,+C.+(2018).+Social+engineering:+The+science+of+human+hacking.+Wiley.&ots=vdiBFUl4PM&sig=gbfPBishpB7nHQvpBCcjWXnvzrU
[4] Manoharan, A., & Sarker, M. (2023). Revolutionizing Cybersecurity: Unleashing the Power of Artificial Intelligence and Machine Learning for Next-Generation Threat Detection. DOI: Https://Www. Doi. Org/10.56726/IRJMETS32644, 1. https://www.academia.edu/download/112737594/REVOLUTIONIZING_CYBERSECURITY.pdf
[5] Pakina, A. K., Kejriwal, D., & Pujari, T. D. (2025). Adversarial AI in Social Engineering Attacks: Large-Scale Detection and Automated Counter measures. International Journal Science and Technology, 4(1), 1–11.
[6] Kolluri, V. (2024). Revolutionary research on the ai sentry: An approach to overcome social engineering attacks using machine intelligence. International Journal of Advanced Research and Interdisciplinary Scientific Endeavours, 1(1), 53–60.
[7] Fakhouri, H. N., Alhadidi, B., Omar, K., Makhadmeh, S. N., Hamad, F., & Halalsheh, N. Z. (2024). Ai-driven solutions for social engineering attacks: Detection, prevention, and response. 2024 2nd International Conference on Cyber Resilience (ICCR), 1–8. https://ieeexplore.ieee.org/abstract/document/10533010/
[8] Schmitt, M., & Flechais, I. (2024). Digital deception: Generative artificial intelligence in social engineering and phishing. Artificial Intelligence Review, 57(12), 324. https://doi.org/10.1007/s10462-024-10973-2
[9] Manyam, S. (2022). Artificial intelligence’s impact on social engineering attacks. https://opus.govst.edu/capstones/561/
[10] Shanthi, D., Ashok, G., Biswal, C., Udharika, S., Varshini, S., & Sindhu, G. (2025). Ai-Driven Adaptive It Training: A Personalized Learning Framework For Enhanced Knowledge Retention And Engagement. Metallurgical and Materials Engineering, 136–145.
[11] Vadivel, S., Banupriya, R., Nivodhini, M. K., Surendhar, N. D., Subashree, N., & Murali, M. S. (2025). AI-Powered Personalization in Online Learning Systems for Enhanced Engagement and Effective Learning using Collaborative and Content-Based filtering algorithms. International Conference on Sustainability Innovation in Computing and Engineering (ICSICE 2024), 1114–1139. https://www.atlantis-press.com/proceedings/icsice-24/126011423
[12] Ali, S. (2024). The Role of AI in Social Engineering Attack Prevention: NLP-Based Solutions for Phishing and Scams. https://www.researchgate.net/profile/Sajid-Ali-178/publication/388525951_The_Role_of_AI_in_Social_Engineering_Attack_Prevention_NLP-Based_Solutions_for_Phishing_and_Scams/links/679bcf2f52b58d39f25da252/The-Role-of-AI-in-Social-Engineering-Attack-Prevention-NLP-Based-Solutions-for-Phishing-and-Scams.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Oluwatosin Temitope Ogunlade

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.