Phishing Attacks Detection using Machine Learning and Deep Learning Models
Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to steal sensitive data, causing reputational damage, loss of money, ransomware, or other malware infections. Intelligent techniques mainly Machine...
Saved in:
Published in | 2022 7th International Conference on Data Science and Machine Learning Applications (CDMA) pp. 175 - 180 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.03.2022
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/CDMA54072.2022.00034 |
Cover
Abstract | Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to steal sensitive data, causing reputational damage, loss of money, ransomware, or other malware infections. Intelligent techniques mainly Machine Learning (ML) and Deep Learning (D L) are increasingly applied in the field of cybersecurity due to their ability to learn from available data in order to extract useful insight and predict future events. The effectiveness of applying such intelligent approaches in detecting phishing web sites is investigated in this paper. We used two separate datasets and selected the highest correlated features which comprised of a combination of content-based, URL lexical-based, and domain-based features. A set of ML models were then applied, and a comparative performance evaluation was conducted. Results proved the importance of features selection in improving the models' performance. Furthermore, the results also aimed to identify the best features that influence the model in identifying phishing websites. For classification performance, Random Forest (RF) algorithm achieved the highest accuracy for both datasets. |
---|---|
AbstractList | Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to steal sensitive data, causing reputational damage, loss of money, ransomware, or other malware infections. Intelligent techniques mainly Machine Learning (ML) and Deep Learning (D L) are increasingly applied in the field of cybersecurity due to their ability to learn from available data in order to extract useful insight and predict future events. The effectiveness of applying such intelligent approaches in detecting phishing web sites is investigated in this paper. We used two separate datasets and selected the highest correlated features which comprised of a combination of content-based, URL lexical-based, and domain-based features. A set of ML models were then applied, and a comparative performance evaluation was conducted. Results proved the importance of features selection in improving the models' performance. Furthermore, the results also aimed to identify the best features that influence the model in identifying phishing websites. For classification performance, Random Forest (RF) algorithm achieved the highest accuracy for both datasets. |
Author | Aljabri, Malak Mirza, Samiha |
Author_xml | – sequence: 1 givenname: Malak surname: Aljabri fullname: Aljabri, Malak email: mssjabri@uqu.edu.sa organization: Umm Al-Qura University,College of Computer and Information Systems,Computer Science Department,Makkah,Saudi Arabia,21955 – sequence: 2 givenname: Samiha surname: Mirza fullname: Mirza, Samiha email: 2180007084@iau.edu.sa organization: College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University,SAUDI ARAMCO Cybersecurity Chair,Department of Computer Science,Dammam,Saudi Arabia,31441 |
BookMark | eNpFjstOwzAURI0EC1r4AljkBxLu9TNdRilPJYIFrCvHuaFWW6eKzYK_JxVIrEY6ZzSaBTsPYyDGbhEKRFjd1eu2UhIMLzhwXgCAkGdsgVoriYASLtnL29bHrQ-fWZWSdbuYrSmRS34M2Vc88da62VPWkJ3CCdjQzyU6_pN27Gkfr9jFYPeRrv9yyT4e7t_rp7x5fXyuqyb3HETKrSOusXTKmgF7HEB0fOBSkC2FkyUJlIPRrtfQdUY6VPNdp3F2ANJ0UizZze-uJ6LNcfIHO31vVkZoobj4AbHMSSI |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CDMA54072.2022.00034 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1665410140 9781665410144 |
EndPage | 180 |
ExternalDocumentID | 9736352 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i203t-ace2618c5a7f1d1f03b2f243ea83c48e314f76cd60bb74c15166c613c40047b43 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:36:59 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-ace2618c5a7f1d1f03b2f243ea83c48e314f76cd60bb74c15166c613c40047b43 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9736352 |
PublicationCentury | 2000 |
PublicationDate | 2022-March |
PublicationDateYYYYMMDD | 2022-03-01 |
PublicationDate_xml | – month: 03 year: 2022 text: 2022-March |
PublicationDecade | 2020 |
PublicationTitle | 2022 7th International Conference on Data Science and Machine Learning Applications (CDMA) |
PublicationTitleAbbrev | CDMA |
PublicationYear | 2022 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.959252 |
Snippet | Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 175 |
SubjectTerms | Deep learning Feature extraction Machine Learning Machine learning algorithms Performance evaluation Phishing Phishing website Radio frequency Random Forest Uniform resource locators |
Title | Phishing Attacks Detection using Machine Learning and Deep Learning Models |
URI | https://ieeexplore.ieee.org/document/9736352 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEA21J08qrfhNDh7ddrPJJrvH0lpKodKDhd7KZjKpomyLbi_-epPsakU8eAshkDAheUzy3htCblPhUEv6r_9MQiRyqSMNLkthQucAlkmJgeX7ICcLMV2myxa5-9bCIGIgn2HPN8NfvtnAzj-V9XPFHT66C_dAqbzWajVqOBbn_eFoNvB2cl5elQQbTl8N-UfNlAAZ4yMy-5qsZoq89HaV7sHHLx_G_67mmHT34jw6_4adE9LCskOm86f6MYkOqsrL5ukIq8CyKqmntq_pLLAmkTaGqmtalMYNwu2-x9dFe33vksX4_nE4iZoyCdFzEvMqKgBdGpRBWijLDLMx14lNBMci4yAy5ExYJcHIWGslwEG8lOBQHPzxVVrwU9IuNyWeEQopTwoXQyMTIyTHrDBpLtBYaxIGKj0nHR-H1bZ2wlg1Ibj4u_uSHPqdqBlbV6Rdve3w2kF4pW_C3n0CwOKcdg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4IHvSkBoy_7cGjg23tuu1IQILICAdIuJH19Q2NZBAdF_96226CMR68NU2TNq9pv7z2-75HyH3ANWoJ8_UfCXB4LKQjQWcpHpcxQOYJgZblOxaDGR_Og3mNPOy0MIhoyWfYMk37l6_WsDVPZe04ZBof9YV7EOisIizVWpUeznPjdreXdIyhnBFY-daI09RD_lE1xYJG_5gk39OVXJG31raQLfj85cT43_WckOZenkcnO-A5JTXMG2Q4eSmfk2inKIxwnvawsDyrnBpy-5ImljeJtLJUXdI0V3oQbvY9pjLa6qNJZv3HaXfgVIUSnFffZYWTAupEKIIgDTNPeZnLpJ_5nGEaMeARMo9noQAlXClDDhrkhQCN42AOcCg5OyP1fJ3jOaEQMD_VMVTCV1wwjFIVxBxVlinfgzC4IA0Th8Wm9MJYVCG4_Lv7jhwOpsloMXoaP1-RI7MrJX_rmtSL9y3eaEAv5K3dxy8qmZ_H |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+7th+International+Conference+on+Data+Science+and+Machine+Learning+Applications+%28CDMA%29&rft.atitle=Phishing+Attacks+Detection+using+Machine+Learning+and+Deep+Learning+Models&rft.au=Aljabri%2C+Malak&rft.au=Mirza%2C+Samiha&rft.date=2022-03-01&rft.pub=IEEE&rft.spage=175&rft.epage=180&rft_id=info:doi/10.1109%2FCDMA54072.2022.00034&rft.externalDocID=9736352 |