Machine Learning Techniques for Detecting Phishing URL Attacks

被引:4
作者
Mosa, Diana T. [1 ,2 ]
Shams, Mahmoud Y. [3 ]
Abohany, Amr A. [2 ]
El-kenawy, El-Sayed M. [4 ]
Thabet, M. [5 ]
机构
[1] Coll Engn & Informat Technol, Buraydah Private Coll, Dept Cyber Secur, Buraydah 51418, Saudi Arabia
[2] Kafrelsheikh Univ, Fac Comp & Informat, Kafrelsheikh 33516, Egypt
[3] Kafrelsheikh Univ, Fac Artificial Intelligence, Kafrelsheikh 33516, Egypt
[4] Delta Higher Inst Engn & Technol, Mansoura 35111, Egypt
[5] Fayoum Univ, Fac Comp & Informat, Al Fayyum, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 75卷 / 01期
关键词
Cyber security; phishing attack; URL phishing; online social; networks; machine learning; ALGORITHM; WEBSITES;
D O I
10.32604/cmc.2023.036422
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One of the online security challenges is the enormous number of daily transactions done via phishing sites. As Cyber-Security have a priority for all organizations, Cyber-Security risks are considered part of an organization's risk management process. This paper presents a survey of different modern machine-learning approaches that handle phishing problems and detect with high-quality accuracy different phishing attacks. A dataset consisting of more than 11000 websites from the Kaggle dataset was utilized and studying the effect of 30 website features and the resulting class label indicating whether or not it is a phishing website (1 or -1). Furthermore, we determined the confusion matrices of Machine Learning models: Neural Networks (NN), Naive Bayes, and Adaboost, and the results indicated that the accuracies achieved were 90.23%, 92.97%, and 95.43%, respectively.
引用
收藏
页码:1271 / 1290
页数:20
相关论文
共 62 条
[1]   Malicious and Spam Posts in Online Social Networks [J].
Abu-Nimeh, Saeed ;
Chen, Thomas M. ;
Alzubi, Omar .
COMPUTER, 2011, 44 (09) :23-28
[2]  
Adeyemo Victor E., 2021, Advances in Cyber Security: Second International Conference, ACeS 2020. Communications in Computer and Information Science (1347), P627, DOI 10.1007/978-981-33-6835-4_41
[3]   A flexible, privacy-preserving authentication framework for ubiquitous computing environments [J].
Al-Muhtadi, J ;
Ranganathan, A ;
Campbell, R ;
Mickunas, MD .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, :771-776
[4]  
Ali Arif, 2022, IoT as a Service: 7th EAI International Conference, IoTaaS 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (421), P73, DOI 10.1007/978-3-030-95987-6_5
[5]   Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting [J].
Ali, Waleed ;
Ahmed, Adel A. .
IET INFORMATION SECURITY, 2019, 13 (06) :659-669
[6]   An Effective Phishing Detection Model Based on Character Level Convolutional Neural Network from URL [J].
Aljofey, Ali ;
Jiang, Qingshan ;
Qu, Qiang ;
Huang, Mingqing ;
Niyigena, Jean-Pierre .
ELECTRONICS, 2020, 9 (09) :1-24
[7]   AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites [J].
Alsariera, Yazan Ahmad ;
Adeyemo, Victor Elijah ;
Balogun, Abdullateef Oluwagbemiga ;
Alazzawi, Ammar Kareem .
IEEE ACCESS, 2020, 8 :142532-142542
[8]  
Ambika P., 2016, INT C RES ADV INTEGR, P1
[9]   Phishing website detection using support vector machines and nature-inspired optimization algorithms [J].
Anupam, Sagnik ;
Kar, Arpan Kumar .
TELECOMMUNICATION SYSTEMS, 2021, 76 (01) :17-32
[10]  
Atlam H.F., 2020, PRINCIPLES INTERNET, P551, DOI 10.1007/978-3-030-33596-0_22