Phishing Webpage Classification via Deep Learning-Based Algorithms: An Empirical Study

被引:15
作者
Nguyet Quang Do [1 ]
Selamat, Ali [1 ,2 ,3 ,4 ]
Krejcar, Ondrej [4 ]
Yokoi, Takeru [5 ]
Fujita, Hamido [6 ,7 ,8 ]
机构
[1] Univ Teknol Malaysia Kuala Lumpur, Malaysia Japan Int Inst Technol MJIIT, Jalan Sultan Yahya Petra, Kuala Lumpur 54100, Malaysia
[2] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu 80000, Johor, Malaysia
[3] Univ Teknol Malaysia, Media & Games Ctr Excellence MagicX, Johor Baharu 81310, Johor, Malaysia
[4] Univ Hradec Kralove, Fac Informat & Management, Ctr Basic & Appl Res, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic
[5] Tokyo Metropolitan Coll Ind Technol, Tokyo 1400011, Japan
[6] Univ Granada, Andalusian Res Inst Data Sci & Computat Intellige, Granada 18001, Spain
[7] I SOMET Inc Assoc, Morioka, Iwate 0200000, Japan
[8] Iwate Prefectural Univ, Reg Res Ctr, Takizawa, Iwate 0284211, Japan
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 19期
关键词
phishing detection; deep learning (DL); deep neural network (DNN); convolutional neural network (CNN); long short-term memory (LSTM); gated recurrent unit (GRU); CONVOLUTIONAL NEURAL-NETWORK;
D O I
10.3390/app11199210
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Phishing detection with high-performance accuracy and low computational complexity has always been a topic of great interest. New technologies have been developed to improve the phishing detection rate and reduce computational constraints in recent years. However, one solution is insufficient to address all problems caused by attackers in cyberspace. Therefore, the primary objective of this paper is to analyze the performance of various deep learning algorithms in detecting phishing activities. This analysis will help organizations or individuals select and adopt the proper solution according to their technological needs and specific applications' requirements to fight against phishing attacks. In this regard, an empirical study was conducted using four different deep learning algorithms, including deep neural network (DNN), convolutional neural network (CNN), Long Short-Term Memory (LSTM), and gated recurrent unit (GRU). To analyze the behaviors of these deep learning architectures, extensive experiments were carried out to examine the impact of parameter tuning on the performance accuracy of the deep learning models. In addition, various performance metrics were measured to evaluate the effectiveness and feasibility of DL models in detecting phishing activities. The results obtained from the experiments showed that no single DL algorithm achieved the best measures across all performance metrics. The empirical findings from this paper also manifest several issues and suggest future research directions related to deep learning in the phishing detection domain.
引用
收藏
页数:32
相关论文
共 62 条
[1]   Deep Learning with Convolutional Neural Network and Long Short-Term Memory for Phishing Detection [J].
Adebowale, M. A. ;
Lwin, K. T. ;
Hossain, M. A. .
2019 13TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2019,
[2]   URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models [J].
Afzal, Sara ;
Asim, Muhammad ;
Javed, Abdul Rehman ;
Beg, Mirza Omer ;
Baker, Thar .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (03)
[3]   Machine learning approaches to IoT security: A systematic literature review [J].
Ahmad, Rasheed ;
Alsmadi, Izzat .
INTERNET OF THINGS, 2021, 14
[4]  
Al-Ahmadi S., 2020, International Journal of Network Security & Its Applications, V12, P59
[5]  
Al-Ahmadi S, 2020, Int. J. Comput. Netw. Commun. (IJCNC), DOI 10.5121/ijcnc.2020.12503
[6]   A Convolutional Neural Network Model to Detect Illegitimate URLs [J].
Al-Milli, Nabeel ;
Hammo, Bassam H. .
2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, :220-225
[7]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[8]   An Effective Phishing Detection Model Based on Character Level Convolutional Neural Network from URL [J].
Aljofey, Ali ;
Jiang, Qingshan ;
Qu, Qiang ;
Huang, Mingqing ;
Niyigena, Jean-Pierre .
ELECTRONICS, 2020, 9 (09) :1-24
[9]  
Alotaibi R., 2020, IEEE Xplore, P1, DOI DOI 10.1109/ICCAIS48893.2020.9096821
[10]   Deep learning and big data technologies for IoT security [J].
Amanullah, Mohamed Ahzam ;
Habeeb, Riyaz Ahamed Ariyaluran ;
Nasaruddin, Fariza Hanum ;
Gani, Abdullah ;
Ahmed, Ejaz ;
Nainar, Abdul Salam Mohamed ;
Akim, Nazihah Md ;
Imran, Muhammad .
COMPUTER COMMUNICATIONS, 2020, 151 :495-517