METHODOLOGY FOR DETECTING MALICIOUS CONTENT USING SENTIMENT ANALYSIS
DOI:
https://doi.org/10.28925/2663-4023.2025.30.921Keywords:
cyber security; informational security; IS; information technology; IT; information protection; vulnerabilities; learning process; educational standard., AI-based detectionAbstract
This paper investigates the problem of detecting malicious content in personal electronic communications, such as emails, social media messages, or messengers. Modern systems for filtering malicious content are mainly based on the analysis of keywords, structural features of messages, and technical parameters, such as IP addresses or message origin domains. Such systems have limited effectiveness against modern cyber threats that use message content with emotional manipulation or fake information. In addition, the effectiveness of such approaches is limited, especially when it comes to targeted attacks and new methods of bypassing protection mechanisms that are constantly evolving.
The paper proposes a hybrid model, "MaliciousContentDetector," which combines lexical methods, machine learning methods (TF-IDF, Random Forest), and deep learning (BERT) for text sentiment analysis. The model takes into account the linguistic features of the Ukrainian language and contextual emotional triggers. The proposed model is also implemented as a software which may be integrated into into browsers and other applications to enhance the cybersecurity of end-users. The developed model was tested on real messages from a popular news channel on a social network. During the analysis of 162 posts in that news channel, the "MaliciousContentDetector" model showed high efficiency and accuracy in detecting potentially malicious text content.
Downloads
References
DeBounce. (2025). Email spam statistics 2025. Retrieved from https://debounce.io/email-spam-statistics
Medhat, W., Hassan, A., & Korashy, H. (2014). Sentiment analysis algorithms and applications: A survey. Ain Shams Engineering Journal. Retrieved from https://www.sciencedirect.com/science/article/pii/S2090447914000550
Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., Kaiser, L., & Polosukhin, I. (2017). Attention is all you need. Advances in Neural Information Processing Systems, 30.
Darchuk, N. (2019). Linguistic approach for development of computer-based sentiment analysis in the Ukrainian language. Science and Education a New Dimension, VII(189)(55), 10–13.* Retrieved from https://seanewdim.com/wp-content/uploads/2021/04/Linguistic-approach-for-development-of-computer-based-sentiment-analysis-in-the-Ukrainian-language-N.-Darchuk.pdf
Kyrychenko, R. (2021). Typology of tasks of machine analysis of texts in contemporary sociology. Sociological Studios, 2(19), 53–62. Retrieved from https://journals.indexcopernicus.com/api/file/viewByFileId/1564492
Riabyshev, O., Yerokhin, A., & Bakhmet, A. (2021). Analysis of the sentiment of the text in the Ukrainian language. Bionics of Intelligence, (96), 15–21. Retrieved from https://openarchive.nure.ua/server/api/core/bitstreams/f59561cb-66a5-4f99-b6ff-cf30a5162f91/content
Devlin, J., Chang, M.-W., Lee, K., & Toutanova, K. (2018). BERT: Pre-training of deep bidirectional transformers for language understanding. Cornell University. Retrieved from https://arxiv.org/abs/1810.04805
Amazon Web Services. (2025). What is sentiment analysis? Sentiment analysis explained. Retrieved from https://aws.amazon.com/what-is/sentiment-analysis
Baccianella, S., Esuli, A., & Sebastiani, F. (2010). SentiWordNet 3.0: An enhanced lexical resource for sentiment analysis and opinion mining. In Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC’10) (pp. 2000–2004).
scikit-learn. (n.d.). Machine learning in Python. Retrieved from https://scikit-learn.org
CrowdStrike. (2025). Falcon Endpoint Protection Platform (EPP). Retrieved from https://www.crowdstrike.co.uk/falcon-platform
Darktrace. (2025). ActiveAI Security Platform | The essential AI cybersecurity platform. Retrieved from https://www.darktrace.com/platform
Microsoft. (2025). Microsoft Security Copilot. Retrieved from https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot
Sift. (2025). Why Sift. Retrieved from https://sift.com/why-sift
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Дмитро Андрушко, Дмитро Шедін , Вадим Чакрян

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.