Phishing and Fraudulent Email Detection through Transfer Learning using pretrained transformer models

被引:1
作者
Gogoi, Bronjon [1 ]
Ahmed, Tasiruddin [1 ]
机构
[1] Natl Informat Ctr, Assam State Ctr, Ctr Excellence Applicat Secur, Gauhati, Assam, India
来源
2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON | 2022年
关键词
Phishing detection; Deep Learning; Pretrained transformer models;
D O I
10.1109/INDICON56171.2022.10040097
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Phishing is a type of social engineering attack used by malicious users and cyber criminals for stealing sensitive information, installation of unwanted and malicious software, ransomware, and other advanced persistent threats on a victim's computer or mobile device. With the widespread adoption of the Internet, phishing attacks are on the rise and the recent work-from-home paradigm has increased the risk of phishing attacks targeted at large and small organizations alike. The consequences of phishing scams are often severe, ranging from financial loss, identity theft, data loss, and data theft. Though there are many ways of launching phishing attacks, phishing emails are one of the most commonly used techniques employed by cybercriminals. This is primarily because email addresses are easily obtainable and sending bulk emails is quite cheap, enabling attackers to send out a large number of emails hoping a few users will fall prey to the scam. Phishing emails are used for stealing sensitive information and credentials, delivering unwanted and malicious software, and delivering ransomware. This paper proposes a deep learning approach for detecting phishing and fraudulent emails. The proposed approach uses state-of-the-art pretrained transformer models and achieves very high accuracy, recall, and f1 score of 0.99.
引用
收藏
页数:6
相关论文
共 16 条
  • [1] Applying machine learning and natural language processing to detect phishing email
    Alhogail, Areej
    Alsabih, Afrah
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [2] [Anonymous], Cobalt
  • [3] [Anonymous], 2022, PHISH STAT UPD 2022
  • [4] Apwg, 2021, APWG REP PHISH ATT D
  • [5] Bagui S., 2019, 2019 INT C CYB SEC P, P1, DOI 10.1109/CyberSecPODS.2019.8885143
  • [6] Cukierski W., 2016, ENRON EMAIL DATASET
  • [7] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
  • [8] Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
    Fang, Yong
    Zhang, Cheng
    Huang, Cheng
    Liu, Liang
    Yang, Yue
    [J]. IEEE ACCESS, 2019, 7 : 56329 - 56340
  • [9] Fette I., 2007, P 16 INT C WORLD WID, P649, DOI DOI 10.1145/1242572.1242660
  • [10] Gangavarapu T., 2020, APPL MACHINE LEARNIN, V53