Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models

被引:3
作者
Jha, Birendra [1 ]
Atre, Medha [1 ]
Rao, Ashwini [1 ]
机构
[1] Eydle Inc, Los Angeles, CA 91107 USA
来源
2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA | 2022年
关键词
Deep Learning; Phishing; Cybersecurity;
D O I
10.1109/TPS-ISA56441.2022.00026
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web-based phishing attacks nowadays exploit popular cloud web hosting services and apps such as Google Sites and Typeform for hosting their attacks. Since these attacks originate from reputable domains and IP addresses of the cloud services, traditional phishing detection methods such as IP reputation monitoring and blacklisting are not very effective. Here we investigate the effectiveness of deep learning models in detecting this class of cloud-based phishing attacks. Specifically, we evaluate deep learning models for three phishing detection methods-LSTM model for URL analysis, YOLOv2 model for logo analysis, and triplet network model for visual similarity analysis. We train the models using well-known datasets and test their performance on cloud-based phishing attacks in the wild. Our results qualitatively explain why the models succeed or fail. Furthermore, our results highlight how combining results from the individual models can improve the effectiveness of detecting cloud-based phishing attacks.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 49 条
[1]  
Abdelnabi S., 2020, ACM SIGSAC C COMPUTE
[2]   PhishZoo: Detecting Phishing Websites By Looking at Them [J].
Afroz, Sadia ;
Greenstadt, Rachel .
FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, :368-375
[3]   An Optimized Stacking Ensemble Model for Phishing Websites Detection [J].
Al-Sarem, Mohammed ;
Saeed, Faisal ;
Al-Mekhlafi, Zeyad Ghaleb ;
Mohammed, Badiea Abdulkarem ;
Al-Hadhrami, Tawfik ;
Alshammari, Mohammad T. ;
Alreshidi, Abdulrahman ;
Alshammari, Talal Sarheed .
ELECTRONICS, 2021, 10 (11)
[4]  
[Anonymous], 2021, STAT PHISH PROOFP
[5]  
[Anonymous], PHISH PRED DEEP LEAR
[6]  
Basit A., 2020, P 2020 IEEE 23 INT M, P1, DOI [https://doi.org/10.1109/INMIC50486.2020.9318210, DOI 10.1109/INMIC50486.2020.9318210]
[7]  
Bastan M., 2019, LARGE SCALE OPEN SET
[8]  
Blog.roboflow, LAB LAB OBJ DET DAT
[9]  
Blum Aaron., 2010, Proceedings of the Workshop on Artificial Intelligence and Security, V1, P1, DOI DOI 10.1145/1866423.1866434
[10]   LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition [J].
Bozkir, Ahmet Selman ;
Aydos, Murat .
COMPUTERS & SECURITY, 2020, 95