Cloud-based email phishing attack using machine and deep learning algorithm

被引:0
作者
Umer Ahmed Butt
Rashid Amin
Hamza Aldabbas
Senthilkumar Mohan
Bader Alouffi
Ali Ahmadian
机构
[1] University of Engineering and Technology,Department of Computer Science
[2] University of Chakwal,Department of Computer Science
[3] Al-Balqa Applied University,Prince Abdullah Bin Ghazi Faculty of Information and Communication Technology
[4] Vellore Institute of Technology,School of Information Technology and Engineering
[5] Taif University,Department of Computer Science, College of Computers and Information Technology
[6] Near East University,Department of Mathematics
来源
Complex & Intelligent Systems | 2023年 / 9卷
关键词
Phishing detection; Extract feature; Label data; Feature selection; Text processing; Machine learning; Long short term memory (LSTM); Support vector machine (SVM) classification; Phishing dataset; [inline-graphic not available: see fulltext]; [inline-graphic not available: see fulltext]; [inline-graphic not available: see fulltext]; [inline-graphic not available: see fulltext]; [inline-graphic not available: see fulltext];
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive data for individuals or groups. Financial data, credit reports, and other sensitive data are often sent via the Internet. Phishing is a fraudster's technique used to get sensitive data from users by seeming to come from trusted sources. The sender can persuade you to give secret data by misdirecting in a phished email. The main problem is email phishing attacks while sending and receiving the email. The attacker sends spam data using email and receives your data when you open and read the email. In recent years, it has been a big problem for everyone. This paper uses different legitimate and phishing data sizes, detects new emails, and uses different features and algorithms for classification. A modified dataset is created after measuring the existing approaches. We created a feature extracted comma-separated values (CSV) file and label file, applied the support vector machine (SVM), Naive Bayes (NB), and long short-term memory (LSTM) algorithm. This experimentation considers the recognition of a phished email as a classification issue. According to the comparison and implementation, SVM, NB and LSTM performance is better and more accurate to detect email phishing attacks. The classification of email attacks using SVM, NB, and LSTM classifiers achieve the highest accuracy of 99.62%, 97% and 98%, respectively.
引用
收藏
页码:3043 / 3070
页数:27
相关论文
共 10 条
  • [1] Ubaid F(2017)Mitigating address spoofing attacks in hybrid SDN 8 562-570
  • [2] Almomani DA(2013)A survey of phishing email filtering techniques IEEE Commun Surv Tutor 15 2070-2090
  • [3] Karim A(2019)A comprehensive survey for intelligent spam email detection IEEE Access 7 168261-168295
  • [4] Wang J(2012)Research article phishing susceptibility: an investigation into the processing of a targeted spear phishing email IEEE Trans Prof Commun 55 345-362
  • [5] Hr MG(2020)Development of anti-phishing browser based on random forest and rule of extraction framework Cybersecurity 3 20-29
  • [6] Khan MA(2016)A survey of security issues for cloud computing J Netw Comput Appl 71 11-6
  • [7] Nathezhtha T(2019)WC-PAD: web crawling based phishing attack detection Int Carnah Conf Secur Technol (ICCST) 2019 1-undefined
  • [8] Sangeetha D(2021)Malware detection on windows audit logs using LSTMs Comput Secur 109 undefined-undefined
  • [9] Vaidehi V(undefined)undefined undefined undefined undefined-undefined
  • [10] Ring M(undefined)undefined undefined undefined undefined-undefined