Enhanced machine learning algorithm for detection and classification of phishing attacks

Mutaz Abdel Wahed

Abstract


Machine learning employs artificial neural networks to acquire representations. Phishing is duplicitous behavior or threat where attackers aim to obtain credential information from websites. Phishing websites are fraudulent attempts by cybercriminals to impersonate reputable sites with mission of deceiving victims in divulging personnel information such as credentials, and personal data. Detecting and categorizing these malicious sites has been a topic of interest, with various methods focusing on URL-based techniques proving effective. Among these, machine learning and artificial intelligence approaches leveraging URL features have demonstrated superior results, contingent on the specific features utilized. This research proposes a novel model using a decision tree and a specific feature set to enhance the accuracy of phishing website detection, especially IoT devices. The research explores the impact of selecting a the most common attributes from the well-trained datasets to optimize performance and speed in classification and categorization phishing attacks on IoT devices. Experimental findings and comparative analysis present that the implemented algorithms achieve exceptional performance, with the proposed model achieving an impressive accuracy in identifying phishing URLs.

Full Text:

PDF

References


Ghazi-Tehrani, Adam Kavon, and Henry N. Pontell. "Phishing evolves: Analyzing the enduring cybercrime." In The New Technology of Financial Crime, pp. 35-61. Routledge, 2022.

Nadeem, Muhammad, Syeda Wajiha Zahra, Muhammad Nouman Abbasi, Ali Arshad, Saman Riaz, and Waqas Ahmed. "Phishing attack, its detections and prevention techniques." Int. J. Wirel. Secur. Netw 1 (2023): 13-25.

Carroll, Fiona, John Ayooluwa Adejobi, and Reza Montasari. "How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society." SN Computer science 3, no. 2 (2022): 170.

Chanti, S., and T. Chithralekha. "A literature review on classification of phishing attacks." International Journal of Advanced Technology and Engineering Exploration 9, no. 89 (2022): 446-476..

Desolda, Giuseppe, Lauren S. Ferro, Andrea Marrella, Tiziana Catarci, and Maria Francesca Costabile. "Human factors in phishing attacks: a systematic literature review." ACM Computing Surveys (CSUR) 54, no. 8 (2021): 1-35.

Goenka, Richa, Meenu Chawla, and Namita Tiwari. "A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy." International Journal of Information Security 23, no. 2 (2024): 819-848.

Wang, Mengli, and Lipeng Song. "Efficient defense strategy against spam and phishing email: An evolutionary game model." Journal of Information Security and Applications 61 (2021): 102947.

Bhardwaj, Akashdeep, Fadi Al-Turjman, Varun Sapra, Manoj Kumar, and Thompson Stephan. "Privacy-aware detection framework to mitigate new-age phishing attacks." Computers & Electrical Engineering 96 (2021): 107546.

Aslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions." Electronics 12, no. 6 (2023): 1333.

Gomes, Vanessa, Joaquim Reis, and Bráulio Alturas. "Social engineering and the dangers of phishing." In 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-7. IEEE, 2020.

Andriu, Adrian-Viorel. "Adaptive phishing detection: Harnessing the power of Artificial Intelligence for enhanced email security." Romanian Cyber Secur. J 5, no. 1 (2023): 3-9.

M. A. Wahed, "Real-Time Intrusion Detection and Traffic Analysis Using AI Techniques in IoT Infrastructure," 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI), Sana'a, Yemen, 2024, pp. 1-6, doi: 10.1109/ICETI63946.2024.10777213.

Jimmy, F. N. U. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023 2, no. 1 (2024): 129-171.

Rains, Tim. Cybersecurity Threats, Malware Trends, and Strategies: Learn to mitigate exploits, malware, phishing, and other social engineering attacks. Packt Publishing Ltd, 2020.

Lim, Wei Heng, W. Foong Liew, Chun Yew Lum, and Seah Fang Lee. "Phishing security: Attack, detection, and prevention mechanisms." In Proceedings of the International Conference on Digital Transformation and Applications (ICDXA). 2020.

Basit, Abdul, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil, and Kashif Kifayat. "A comprehensive survey of AI-enabled phishing attacks detection techniques." Telecommunication Systems 76 (2021): 139-154.


Refbacks



Abava  Кибербезопасность IT Congress 2024

ISSN: 2307-8162