期刊文献+
共找到266篇文章
< 1 2 14 >
每页显示 20 50 100
Machine Learning Techniques for Detecting Phishing URL Attacks
1
作者 Diana T.Mosa Mahmoud Y.Shams +2 位作者 Amr AAbohany El-Sayed M.El-kenawy M.Thabet 《Computers, Materials & Continua》 SCIE EI 2023年第4期1271-1290,共20页
Cyber Attacks are critical and destructive to all industry sectors.They affect social engineering by allowing unapproved access to a Personal Computer(PC)that breaks the corrupted system and threatens humans.The defen... Cyber Attacks are critical and destructive to all industry sectors.They affect social engineering by allowing unapproved access to a Personal Computer(PC)that breaks the corrupted system and threatens humans.The defense of security requires understanding the nature of Cyber Attacks,so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks.Cyber-Security proposes appropriate actions that can handle and block attacks.A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information.One of the online security challenges is the enormous number of daily transactions done via phishing sites.As Cyber-Security have a priority for all organizations,Cyber-Security risks are considered part of an organization’s risk management process.This paper presents a survey of different modern machine-learning approaches that handle phishing problems and detect with high-quality accuracy different phishing attacks.A dataset consisting of more than 11000 websites from the Kaggle dataset was utilized and studying the effect of 30 website features and the resulting class label indicating whether or not it is a phishing website(1 or−1).Furthermore,we determined the confusion matrices of Machine Learning models:Neural Networks(NN),Na飗e Bayes,and Adaboost,and the results indicated that the accuracies achieved were 90.23%,92.97%,and 95.43%,respectively. 展开更多
关键词 Cyber security phishing attack URL phishing online social networks machine learning
下载PDF
Phish Block:A Blockchain Framework for Phish Detection in Cloud
2
作者 R.N.Karthika C.Valliyammai M.Naveena 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期777-795,共19页
The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of m... The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of much techno-logical advancement,phishing acts as thefirst step in a series of attacks.With technological advancements,availability and access to the phishing kits has improved drastically,thus making it an ideal tool for the hackers to execute the attacks.The phishing cases indicate use of foreign characters to disguise the ori-ginal Uniform Resource Locator(URL),typosquatting the popular domain names,using reserved characters for re directions and multi-chain phishing.Such phishing URLs can be stored as a part of the document and uploaded in the cloud,providing a nudge to hackers in cloud storage.The cloud servers are becoming the trusted tool for executing these attacks.The prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client’s end(browser).At the same time,the avalanche effect and immut-ability of block-chain proves to be a strong source of security.Considering these trends in technology,a block-chain basedfiltering implementation for preserving the integrity of user data stored in the cloud is proposed.The proposed Phish Block detects the homographic phishing URLs with accuracy of 91%which assures the security in cloud storage. 展开更多
关键词 Cloud server phishing URLs phish detection blockchain safe files smart contract
下载PDF
Empirical Analysis of Neural Networks-Based Models for Phishing Website Classification Using Diverse Datasets
3
作者 Shoaib Khan Bilal Khan +2 位作者 Saifullah Jan Subhan Ullah Aiman 《Journal of Cyber Security》 2023年第1期47-66,共20页
Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information,a problem that persists despite user awareness.This study addresses the pressing issue of phis... Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information,a problem that persists despite user awareness.This study addresses the pressing issue of phishing attacks on websites and assesses the performance of three prominent Machine Learning(ML)models—Artificial Neural Networks(ANN),Convolutional Neural Networks(CNN),and Long Short-Term Memory(LSTM)—utilizing authentic datasets sourced from Kaggle and Mendeley repositories.Extensive experimentation and analysis reveal that the CNN model achieves a better accuracy of 98%.On the other hand,LSTM shows the lowest accuracy of 96%.These findings underscore the potential of ML techniques in enhancing phishing detection systems and bolstering cybersecurity measures against evolving phishing tactics,offering a promising avenue for safeguarding sensitive information and online security. 展开更多
关键词 Artificial neural networks phishing websites network security machine learning phishing datasets CLASSIFICATION
下载PDF
Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps
4
作者 Muhammad Bilal Sandile C.Showngwe +1 位作者 Abid Bashir Yazeed Y.Ghadi 《Computers, Materials & Continua》 SCIE EI 2023年第6期4713-4733,共21页
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task nowadays.For this purpose,authen-tication protocol plays a vital role in web communication which securely transfers dat... To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task nowadays.For this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to another.This authentication works via OpenID,Kerberos,password authentication protocols,etc.However,there are still some limitations present in the reported security protocols.In this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern method.The proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and trustworthy.The first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication link.This Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing attacks.This study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and OpenID.The experimental sites were examined by 72 information technology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via Email.The proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere. 展开更多
关键词 SECURE user authentication SSO OPENID phishing attack MITM attack
下载PDF
Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification
5
作者 R.Brindha S.Nandagopal +3 位作者 H.Azath V.Sathana Gyanendra Prasad Joshi Sung Won Kim 《Computers, Materials & Continua》 SCIE EI 2023年第3期5901-5914,共14页
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us... Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in cyberattacks.Though the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the victims.In this background,there is a drastic increase observed in the number of phishing emails sent to potential targets.This scenario necessitates the importance of designing an effective classification model.Though numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the literature.The current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)model.The aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing ones.At the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word elimination.Then,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature vectors.Moreover,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing emails.Furthermore,the CS algorithm is used to fine-tune the parameters involved in the GRU model.The performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several dimensions.Extensive comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing approaches.The proposed model achieved a maximum accuracy of 99.72%. 展开更多
关键词 phishing email data classification natural language processing deep learning CYBERSECURITY
下载PDF
Modelling an Efficient URL Phishing Detection Approach Based on a Dense Network Model
6
作者 A.Aldo Tenis R.Santhosh 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2625-2641,共17页
The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called phishing.The deep learning approaches and the machine learn... The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called phishing.The deep learning approaches and the machine learning are compared in the proposed system for presenting the methodology that can detect phishing websites via Uniform Resource Locator(URLs)analysis.The legal class is composed of the home pages with no inclusion of login forms in most of the present modern solutions,which deals with the detection of phishing.Contrarily,the URLs in both classes from the login page due,considering the representation of a real case scenario and the demonstration for obtaining the rate of false-positive with the existing approaches during the legal login pages provides the test having URLs.In addition,some model reduces the accuracy rather than training the base model and testing the latest URLs.In addition,a feature analysis is performed on the present phishing domains to identify various approaches to using the phishers in the campaign.A new dataset called the MUPD dataset is used for evaluation.Lastly,a prediction model,the Dense forward-backwards Long Short Term Memory(LSTM)model(d−FBLSTM),is presented for combining the forward and backward propagation of LSMT to obtain the accuracy of 98.5%on the initiated login URL dataset. 展开更多
关键词 Cyber-attack URL phishing attack attention model prediction accuracy
下载PDF
Optimal Deep Belief Network Enabled Cybersecurity Phishing Email Classification
7
作者 Ashit Kumar Dutta T.Meyyappan +4 位作者 Basit Qureshi Majed Alsanea Anas Waleed Abulfaraj Manal M.Al Faraj Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2701-2713,共13页
Recently,developments of Internet and cloud technologies have resulted in a considerable rise in utilization of online media for day to day lives.It results in illegal access to users’private data and compromises it.... Recently,developments of Internet and cloud technologies have resulted in a considerable rise in utilization of online media for day to day lives.It results in illegal access to users’private data and compromises it.Phishing is a popular attack which tricked the user into accessing malicious data and gaining the data.Proper identification of phishing emails can be treated as an essential process in the domain of cybersecurity.This article focuses on the design of bio-geography based optimization with deep learning for Phishing Email detection and classification(BBODL-PEDC)model.The major intention of the BBODL-PEDC model is to distinguish emails between legitimate and phishing.The BBODL-PEDC model initially performs data pre-processing in three levels namely email cleaning,tokenization,and stop word elimination.Besides,TF-IDF model is applied for the extraction of useful feature vectors.Moreover,optimal deep belief network(DBN)model is used for the email classification and its efficacy can be boosted by the BBO based hyperparameter tuning process.The performance validation of the BBODL-PEDC model can be performed using benchmark dataset and the results are assessed under several dimensions.Extensive comparative studies reported the superior outcomes of the BBODL-PEDC model over the recent approaches. 展开更多
关键词 CYBERSECURITY phishing email data classification deep learning biogeography based optimization hyperparameter tuning
下载PDF
Detection of Phishing in Internet-of-Things Using Hybrid Deep Belief Network
8
作者 S.Ashwini S.Magesh Kumar 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3043-3056,共14页
Increase in the use of internet of things owned devices is one of the reasonsforincreasednetworktraffic.Whileconnectingthesmartdeviceswith publicly available network many kinds of phishing attacks are able to enter in... Increase in the use of internet of things owned devices is one of the reasonsforincreasednetworktraffic.Whileconnectingthesmartdeviceswith publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing system.The Phishing is the slow and resilient attack stacking techniques probe the users.The proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm(NWAT).Though Predictive mapping,Predictive Validation and Predictive analysis mechanism is developed.For the test purpose Canadian Institute of cyber security(CIC)dataset is used for creating a robust prediction model.This attack generates a resilience corruption works that slowly gathers the credential information from the mobiles.The proposed Predictive analysis model(PAM)enabled NWAT algorithm is used to predict the phishing probes in the form of suspicious process happening in the IoT networks.The prediction system considers the peer-to-peer communication window open for the established communication,the suspicious process and its pattern is identified by the new approach.The proposed model is validated by finding thepredictionaccuracy,Precision,recallsF1score,errorrate,Mathew’sCorre-lationCoefficient(MCC)andBalancedDetectionRate(BDR).Thepresented approach is comparatively analyzed with the state-of-the-art approach of existing system related to various types of Phishing probes. 展开更多
关键词 Cyber security internet of things phishing attacks fault-tolerant devices smart devices cyber security attacks
下载PDF
Detecting Phishing Using a Multi-Layered Social Engineering Framework
9
作者 Kofi Sarpong Adu-Manu Richard Kwasi Ahiable 《Journal of Cyber Security》 2023年第1期13-32,共20页
As businesses develop and expand with a significant volume of data,data protection and privacy become increasingly important.Research has shown a tremendous increase in phishing activities during and after COVID-19.Th... As businesses develop and expand with a significant volume of data,data protection and privacy become increasingly important.Research has shown a tremendous increase in phishing activities during and after COVID-19.This research aimed to improve the existing approaches to detecting phishing activities on the internet.We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs.In the algorithm,we considered technical dimensions of phishing attack prevention and mitigation on the internet.In our approach,we merge,Phishtank,Blacklist,Blocklist,and Whitelist to form our framework.A web application system and browser extension were developed to implement the algorithm.The multi-layer phish detector evaluated ten thousandURLs gathered randomly from the internet(five thousand phishing and five thousand legitimate URLs).The system was estimated to detect levels of accuracy,true-positive and false-positive values.The system level accuracy was recorded to be 98.16%.Approximately 49.6%of the websites were detected as illegitimate,whilst 49.8%were seen as legitimate. 展开更多
关键词 phishING social engineering multi-layer framework data protection PRIVACY
下载PDF
Phishing Website URL’s Detection Using NLP and Machine Learning Techniques
10
作者 Dinesh Kalla Sivaraju Kuraku 《Journal on Artificial Intelligence》 2023年第1期145-162,共18页
Phishing websites present a severe cybersecurity risk since they can lead to financial losses,data breaches,and user privacy violations.This study uses machine learning approaches to solve the problem of phishing webs... Phishing websites present a severe cybersecurity risk since they can lead to financial losses,data breaches,and user privacy violations.This study uses machine learning approaches to solve the problem of phishing website detection.Using artificial intelligence,the project aims to provide efficient techniques for locating and thwarting these dangerous websites.The study goals were attained by performing a thorough literature analysis to investigate several models and methods often used in phishing website identification.Logistic Regression,K-Nearest Neighbors,Decision Trees,Random Forests,Support Vector Classifiers,Linear Support Vector Classifiers,and Naive Bayes were all used in the inquiry.This research covers the benefits and drawbacks of several Machine Learning approaches,illuminating how well-suited each is to overcome the difficulties in locating and countering phishing website predictions.The insights gained from this literature review guide the selection and implementation of appropriate models and methods in future research and real-world applications related to phishing detections.The study evaluates and compares accuracy,precision and recalls of several machine learning models in detecting phishing website URL’s detection. 展开更多
关键词 CYBERSECURITY artificial intelligence machine learning NLP phishing detection spam detection phinshing website URLs
下载PDF
基于URL特征的Phishing检测方法(英文) 被引量:2
11
作者 曹玖新 董丹 +1 位作者 毛波 王田峰 《Journal of Southeast University(English Edition)》 EI CAS 2013年第2期134-138,共5页
为了有效检测恶意网络钓鱼(phishing)行为,提出一种基于URL特征的phishing检测方法.该方法首先对现有钓鱼URL与合法URL进行分析对比,提取钓鱼URL的显著特征,然后采用机器学习算法对样本数据集训练从而获得分类检测模型,用来检测待检测的... 为了有效检测恶意网络钓鱼(phishing)行为,提出一种基于URL特征的phishing检测方法.该方法首先对现有钓鱼URL与合法URL进行分析对比,提取钓鱼URL的显著特征,然后采用机器学习算法对样本数据集训练从而获得分类检测模型,用来检测待检测的URL.为适应钓鱼URL的变化,分类模型需要根据新增样本不断更新,因此,设计了一种基于原始样本数据反馈的增量学习算法.实验表明:提取的URL特征与支持向量机(SVM)分类算法的结合能够使phishing检测达到较高的检测精度,且该增量学习算法是有效的. 展开更多
关键词 URL特征 phishing检测 支持向量机 增量学习
下载PDF
Phishing行为及网络金融机构应对策略的博弈分析(英文) 被引量:1
12
作者 刘业政 丁正平 袁雨飞 《电子科技大学学报》 EI CAS CSCD 北大核心 2009年第S1期37-44,共8页
Phishing是近年来新出现的一种网络欺诈,是指欺诈者(Phisher)通过大量发送欺骗性垃圾邮件或采用其他的方式,意图引诱疏于防范的网络用户登陆假冒的知名站点,从而窃取个人敏感信息的一种攻击方式。这种欺诈行为给网络用户尤其是网络金融... Phishing是近年来新出现的一种网络欺诈,是指欺诈者(Phisher)通过大量发送欺骗性垃圾邮件或采用其他的方式,意图引诱疏于防范的网络用户登陆假冒的知名站点,从而窃取个人敏感信息的一种攻击方式。这种欺诈行为给网络用户尤其是网络金融机构的用户带来了大量的损失,也给网络金融机构带来了危害。该文在分析Phisher和网络金融机构的损益函数的基础上,建立了它们之间的二阶段动态博弈模型,并通过对纳什均衡的分析,求出了网络金融机构面对Phishing欺诈的最优策略。 展开更多
关键词 博弈 网络金融机构 phishING
下载PDF
Phishing Techniques in Mobile Devices
13
作者 Belal Amro 《Journal of Computer and Communications》 2018年第2期27-35,共9页
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks rang... The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly probably that it includes personal and sensitive data for that person. The increased use of mobile devices in daily life made mobile systems an excellent target for attacks. One of the most important attacks is phishing attack in which an attacker tries to get the credential of the victim and impersonate him. In this paper, analysis of different types of phishing attacks on mobile devices is provided. Mitigation techniques—anti-phishing techniques—are also analyzed. Assessment of each technique and a summary of its advantages and disadvantages is provided. At the end, important steps to guard against phishing attacks are provided. The aim of the work is to put phishing attacks on mobile systems in light, and to make people aware of these attacks and how to avoid them. 展开更多
关键词 MALWARE phishING ANTI-phishING MOBILE Device MOBILE Application SECURITY PRIVACY
下载PDF
Phishing攻击行为及其防御模型研究 被引量:5
14
作者 张博 李伟华 《计算机科学》 CAS CSCD 北大核心 2006年第3期99-100,124,共3页
仿冒(Phishing)危害愈演愈烈,本文针对其攻击行为进行了详细的分析与介绍,其中使用了建立攻击森林和对攻击进行分类等方法,进而建立了 Phishing 攻击模型。提出了相应的 Phishing 攻击的防范理论体系和具体措施。同时高起点地分析了 IPv... 仿冒(Phishing)危害愈演愈烈,本文针对其攻击行为进行了详细的分析与介绍,其中使用了建立攻击森林和对攻击进行分类等方法,进而建立了 Phishing 攻击模型。提出了相应的 Phishing 攻击的防范理论体系和具体措施。同时高起点地分析了 IPv6环境下的 Phishing 攻击及其防御。 展开更多
关键词 仿冒 IPV6 攻击行为 防御体系
下载PDF
PHISHING WEB IMAGE SEGMENTATION BASED ON IMPROVING SPECTRAL CLUSTERING 被引量:1
15
作者 Li Yuancheng Zhao Liujun Jiao Runhai 《Journal of Electronics(China)》 2011年第1期101-107,共7页
This paper proposes a novel phishing web image segmentation algorithm which based on improving spectral clustering.Firstly,we construct a set of points which are composed of spatial location pixels and gray levels fro... This paper proposes a novel phishing web image segmentation algorithm which based on improving spectral clustering.Firstly,we construct a set of points which are composed of spatial location pixels and gray levels from a given image.Secondly,the data is clustered in spectral space of the similar matrix of the set points,in order to avoid the drawbacks of K-means algorithm in the conventional spectral clustering method that is sensitive to initial clustering centroids and convergence to local optimal solution,we introduce the clone operator,Cauthy mutation to enlarge the scale of clustering centers,quantum-inspired evolutionary algorithm to find the global optimal clustering centroids.Compared with phishing web image segmentation based on K-means,experimental results show that the segmentation performance of our method gains much improvement.Moreover,our method can convergence to global optimal solution and is better in accuracy of phishing web segmentation. 展开更多
关键词 Spectral clustering algorithm CLONAL MUTATION Quantum-inspired Evolutionary Algorithm(QEA) phishing web image segmentation
下载PDF
Phishing攻击技术研究及防范对策
16
作者 刘科 卢涵宇 王华军 《电脑知识与技术》 2010年第6期4399-4400,共2页
为了防止攻击者通过网络钓鱼(phishing)这种新型的网络攻击手段窃取用户的私密信息。论文从网络攻击的角度,指出了phishing攻击的危害性,分析了Phishing攻击的含义和方式,然后针对钓鱼攻击本身的特点,提出了对phishing攻击采取的技术... 为了防止攻击者通过网络钓鱼(phishing)这种新型的网络攻击手段窃取用户的私密信息。论文从网络攻击的角度,指出了phishing攻击的危害性,分析了Phishing攻击的含义和方式,然后针对钓鱼攻击本身的特点,提出了对phishing攻击采取的技术和非技术的防范对策。 展开更多
关键词 phishing攻击 网络安全 网络诈骗 防范
下载PDF
Phishing攻击行为及其防御模型研究
17
作者 张博 李伟华 《计算机工程》 CAS CSCD 北大核心 2006年第14期125-126,135,共3页
仿冒(Phishing)危害愈演愈烈,针对其攻击行为进行了详细的分析与介绍,其中使用了建立攻击森林和对攻击进行分类等方法,进而建立了Phishing攻击模型。提出了相应的Phishing攻击的防范理论体系和具体措施。同时高起点地分析了IPv6环境下的... 仿冒(Phishing)危害愈演愈烈,针对其攻击行为进行了详细的分析与介绍,其中使用了建立攻击森林和对攻击进行分类等方法,进而建立了Phishing攻击模型。提出了相应的Phishing攻击的防范理论体系和具体措施。同时高起点地分析了IPv6环境下的Phishing攻击及其防御。 展开更多
关键词 仿冒 IPV6 攻击行为 防御体系
下载PDF
Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model
18
作者 Hadil Shaiba Jaber S.Alzahrani +3 位作者 Majdy M.Eltahir Radwa Marzouk Heba Mohsen Manar Ahmed Hamza 《Computers, Materials & Continua》 SCIE EI 2022年第12期6425-6441,共17页
Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords,account identifiers,bank details,etc.In general,these kinds of cyberattacks are made at users through phone calls... Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords,account identifiers,bank details,etc.In general,these kinds of cyberattacks are made at users through phone calls,emails,or instant messages.The anti-phishing techniques,currently under use,aremainly based on source code features that need to scrape the webpage content.In third party services,these techniques check the classification procedure of phishing Uniform Resource Locators(URLs).Even thoughMachine Learning(ML)techniques have been lately utilized in the identification of phishing,they still need to undergo feature engineering since the techniques are not well-versed in identifying phishing offenses.The tremendous growth and evolution of Deep Learning(DL)techniques paved the way for increasing the accuracy of classification process.In this background,the current research article presents a Hunger Search Optimization with Hybrid Deep Learning enabled Phishing Detection and Classification(HSOHDL-PDC)model.The presented HSOHDL-PDC model focuses on effective recognition and classification of phishing based on website URLs.In addition,SOHDL-PDC model uses character-level embedding instead of word-level embedding since the URLs generally utilize words with no importance.Moreover,a hybrid Convolutional Neural Network-Long Short Term Memory(HCNN-LSTM)technique is also applied for identification and classification of phishing.The hyperparameters involved in HCNN-LSTM model are optimized with the help of HSO algorithm which in turn produced improved outcomes.The performance of the proposed HSOHDL-PDC model was validated using different datasets and the outcomes confirmed the supremacy of the proposed model over other recent approaches. 展开更多
关键词 Uniform resource locators phishING cyberattacks machine learning deep learning hyperparameter optimization
下载PDF
URL Phishing Detection Using Particle Swarm Optimization and Data Mining
19
作者 Saeed M.Alshahrani Nayyar Ahmed Khan +1 位作者 Jameel Almalki Waleed Al Shehri 《Computers, Materials & Continua》 SCIE EI 2022年第12期5625-5640,共16页
The continuous destruction and frauds prevailing due to phishing URLs make it an indispensable area for research.Various techniques are adopted in the detection process,including neural networks,machine learning,or hy... The continuous destruction and frauds prevailing due to phishing URLs make it an indispensable area for research.Various techniques are adopted in the detection process,including neural networks,machine learning,or hybrid techniques.A novel detection model is proposed that uses data mining with the Particle Swarm Optimization technique(PSO)to increase and empower the method of detecting phishing URLs.Feature selection based on various techniques to identify the phishing candidates from the URL is conducted.In this approach,the features mined from the URL are extracted using data mining rules.The features are selected on the basis of URL structure.The classification of these features identified by the data mining rules is done using PSO techniques.The selection of features with PSO optimization makes it possible to identify phishing URLs.Using a large number of rule identifiers,the true positive rate for the identification of phishing URLs is maximized in this approach.The experiments show that feature selection using data mining and particle swarm optimization helps tremendously identify the phishing URLs based on the structure of the URL itself.Moreover,it can minimize processing time for identifying the phishing website instead.So,the approach can be beneficial to identify suchURLs over the existing contemporary detecting models proposed before. 展开更多
关键词 phishING particle swarm optimization feature selection data mining classification cloud application
下载PDF
Artificial Neural Network for Websites Classification with Phishing Characteristics
20
作者 Ricardo Pinto Ferreira Andréa Martiniano +4 位作者 Domingos Napolitano Marcio Romero Dacyr Dante De Oliveira Gatto Edquel Bueno Prado Farias Renato José Sassi 《Social Networking》 2018年第2期97-109,共13页
Several threats are propagated by malicious websites largely classified as phishing. Its function is important information for users with the purpose of criminal practice. In summary, phishing is a technique used on t... Several threats are propagated by malicious websites largely classified as phishing. Its function is important information for users with the purpose of criminal practice. In summary, phishing is a technique used on the Internet by criminals for online fraud. The Artificial Neural Networks (ANN) are computational models inspired by the structure of the brain and aim to simu-late human behavior, such as learning, association, generalization and ab-straction when subjected to training. In this paper, an ANN Multilayer Per-ceptron (MLP) type was applied for websites classification with phishing cha-racteristics. The results obtained encourage the application of an ANN-MLP in the classification of websites with phishing characteristics. 展开更多
关键词 Artificial INTELLIGENCE Artificial Neural Network Pattern Recognition phishING CHARACTERISTICS SOCIAL Engineering
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部