Intelligent phishing detection scheme using deep learning algorithms

被引:54
作者
Adebowale, Moruf Akin [1 ]
Lwin, Khin T. [2 ]
Hossain, M. A. [2 ]
机构
[1] Anglia Ruskin Univ, Dept Sci & Engn, Cambridge, England
[2] Teesside Univ, Dept Comp Sci & Informat Syst, Middlesbrough, Cleveland, England
关键词
Phishing detection; Cybercrime; Deep learning; Convolutional neural network (CNN); Long short-term memory (LSTM); Big data; Universal resource locator (URL); PROTECTION SCHEME; FEATURES;
D O I
10.1108/JEIM-01-2020-0036
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Phishing attacks have evolved in recent years due to high-tech-enabled economic growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the increase in deception scams and impersonation, as well as to sophisticated online attacks such as phishing. The global impact of phishing attacks will continue to intensify, and thus, a more efficient phishing detection method is required to protect online user activities. To address this need, this study focussed on the design and development of a deep learning-based phishing detection solution that leveraged the universal resource locator and website content such as images, text and frames. Design/methodology/approach Deep learning techniques are efficient for natural language and image classification. In this study, the convolutional neural network (CNN) and the long short-term memory (LSTM) algorithm were used to build a hybrid classification model named the intelligent phishing detection system (IPDS). To build the proposed model, the CNN and LSTM classifier were trained by using 1m universal resource locators and over 10,000 images. Then, the sensitivity of the proposed model was determined by considering various factors such as the type of feature, number of misclassifications and split issues. Findings An extensive experimental analysis was conducted to evaluate and compare the effectiveness of the IPDS in detecting phishing web pages and phishing attacks when applied to large data sets. The results showed that the model achieved an accuracy rate of 93.28% and an average detection time of 25 s. Originality/value The hybrid approach using deep learning algorithm of both the CNN and LSTM methods was used in this research work. On the one hand, the combination of both CNN and LSTM was used to resolve the problem of a large data set and higher classifier prediction performance. Hence, combining the two methods leads to a better result with less training time for LSTM and CNN architecture, while using the image, frame and text features as a hybrid for our model detection. The hybrid features and IPDS classifier for phishing detection were the novelty of this study to the best of the authors' knowledge.
引用
收藏
页码:747 / 766
页数:20
相关论文
共 44 条
[1]   Deep convolutional neural network for the automated detection and diagnosis of seizure using EEG signals [J].
Acharya, U. Rajendra ;
Oh, Shu Lih ;
Hagiwara, Yuki ;
Tan, Jen Hong ;
Adeli, Hojjat .
COMPUTERS IN BIOLOGY AND MEDICINE, 2018, 100 :270-278
[2]   Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text [J].
Adebowale, M. A. ;
Lwin, K. T. ;
Sanchez, E. ;
Hossain, M. A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2019, 115 :300-313
[3]  
Aggarwal A, 2012, ECRIM RES SUM
[4]  
Ahmed ANR, 2016, IEEE IMTC P, P1327
[5]  
[Anonymous], 2017, CRIME ENGLAND WALES
[6]  
*APWG, 2019, UN GLOB RESP CYB
[7]   Phishing threat avoidance behaviour: An empirical investigation [J].
Arachchilage, Nalin Asanka Gamagedara ;
Love, Steve ;
Beznosov, Konstantin .
COMPUTERS IN HUMAN BEHAVIOR, 2016, 60 :185-197
[8]   Security awareness of computer users: A phishing threat avoidance perspective [J].
Arachchilage, Nalin Asanka Gamagedara ;
Love, Steve .
COMPUTERS IN HUMAN BEHAVIOR, 2014, 38 :304-312
[9]   A game design framework for avoiding phishing attacks [J].
Arachchilage, Nalin Asanka Gamagedara ;
Love, Steve .
COMPUTERS IN HUMAN BEHAVIOR, 2013, 29 (03) :706-714
[10]   Deep Machine Learning-A New Frontier in Artificial Intelligence Research [J].
Arel, Itamar ;
Rose, Derek C. ;
Karnowski, Thomas P. .
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2010, 5 (04) :13-18