Phishing Attacks Detection using Machine Learning and Deep Learning Models

Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to steal sensitive data, causing reputational damage, loss of money, ransomware, or other malware infections. Intelligent techniques mainly Machine...

Full description

Saved in:
Bibliographic Details
Published in2022 7th International Conference on Data Science and Machine Learning Applications (CDMA) pp. 175 - 180
Main Authors Aljabri, Malak, Mirza, Samiha
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.03.2022
Subjects
Online AccessGet full text
DOI10.1109/CDMA54072.2022.00034

Cover

Abstract Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to steal sensitive data, causing reputational damage, loss of money, ransomware, or other malware infections. Intelligent techniques mainly Machine Learning (ML) and Deep Learning (D L) are increasingly applied in the field of cybersecurity due to their ability to learn from available data in order to extract useful insight and predict future events. The effectiveness of applying such intelligent approaches in detecting phishing web sites is investigated in this paper. We used two separate datasets and selected the highest correlated features which comprised of a combination of content-based, URL lexical-based, and domain-based features. A set of ML models were then applied, and a comparative performance evaluation was conducted. Results proved the importance of features selection in improving the models' performance. Furthermore, the results also aimed to identify the best features that influence the model in identifying phishing websites. For classification performance, Random Forest (RF) algorithm achieved the highest accuracy for both datasets.
AbstractList Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to steal sensitive data, causing reputational damage, loss of money, ransomware, or other malware infections. Intelligent techniques mainly Machine Learning (ML) and Deep Learning (D L) are increasingly applied in the field of cybersecurity due to their ability to learn from available data in order to extract useful insight and predict future events. The effectiveness of applying such intelligent approaches in detecting phishing web sites is investigated in this paper. We used two separate datasets and selected the highest correlated features which comprised of a combination of content-based, URL lexical-based, and domain-based features. A set of ML models were then applied, and a comparative performance evaluation was conducted. Results proved the importance of features selection in improving the models' performance. Furthermore, the results also aimed to identify the best features that influence the model in identifying phishing websites. For classification performance, Random Forest (RF) algorithm achieved the highest accuracy for both datasets.
Author Aljabri, Malak
Mirza, Samiha
Author_xml – sequence: 1
  givenname: Malak
  surname: Aljabri
  fullname: Aljabri, Malak
  email: mssjabri@uqu.edu.sa
  organization: Umm Al-Qura University,College of Computer and Information Systems,Computer Science Department,Makkah,Saudi Arabia,21955
– sequence: 2
  givenname: Samiha
  surname: Mirza
  fullname: Mirza, Samiha
  email: 2180007084@iau.edu.sa
  organization: College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University,SAUDI ARAMCO Cybersecurity Chair,Department of Computer Science,Dammam,Saudi Arabia,31441
BookMark eNpFjstOwzAURI0EC1r4AljkBxLu9TNdRilPJYIFrCvHuaFWW6eKzYK_JxVIrEY6ZzSaBTsPYyDGbhEKRFjd1eu2UhIMLzhwXgCAkGdsgVoriYASLtnL29bHrQ-fWZWSdbuYrSmRS34M2Vc88da62VPWkJ3CCdjQzyU6_pN27Gkfr9jFYPeRrv9yyT4e7t_rp7x5fXyuqyb3HETKrSOusXTKmgF7HEB0fOBSkC2FkyUJlIPRrtfQdUY6VPNdp3F2ANJ0UizZze-uJ6LNcfIHO31vVkZoobj4AbHMSSI
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CDMA54072.2022.00034
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1665410140
9781665410144
EndPage 180
ExternalDocumentID 9736352
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i203t-ace2618c5a7f1d1f03b2f243ea83c48e314f76cd60bb74c15166c613c40047b43
IEDL.DBID RIE
IngestDate Thu Jun 29 18:36:59 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-ace2618c5a7f1d1f03b2f243ea83c48e314f76cd60bb74c15166c613c40047b43
PageCount 6
ParticipantIDs ieee_primary_9736352
PublicationCentury 2000
PublicationDate 2022-March
PublicationDateYYYYMMDD 2022-03-01
PublicationDate_xml – month: 03
  year: 2022
  text: 2022-March
PublicationDecade 2020
PublicationTitle 2022 7th International Conference on Data Science and Machine Learning Applications (CDMA)
PublicationTitleAbbrev CDMA
PublicationYear 2022
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.959252
Snippet Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to...
SourceID ieee
SourceType Publisher
StartPage 175
SubjectTerms Deep learning
Feature extraction
Machine Learning
Machine learning algorithms
Performance evaluation
Phishing
Phishing website
Radio frequency
Random Forest
Uniform resource locators
Title Phishing Attacks Detection using Machine Learning and Deep Learning Models
URI https://ieeexplore.ieee.org/document/9736352
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEA21J08qrfhNDh7ddrPJJrvH0lpKodKDhd7KZjKpomyLbi_-epPsakU8eAshkDAheUzy3htCblPhUEv6r_9MQiRyqSMNLkthQucAlkmJgeX7ICcLMV2myxa5-9bCIGIgn2HPN8NfvtnAzj-V9XPFHT66C_dAqbzWajVqOBbn_eFoNvB2cl5elQQbTl8N-UfNlAAZ4yMy-5qsZoq89HaV7sHHLx_G_67mmHT34jw6_4adE9LCskOm86f6MYkOqsrL5ukIq8CyKqmntq_pLLAmkTaGqmtalMYNwu2-x9dFe33vksX4_nE4iZoyCdFzEvMqKgBdGpRBWijLDLMx14lNBMci4yAy5ExYJcHIWGslwEG8lOBQHPzxVVrwU9IuNyWeEQopTwoXQyMTIyTHrDBpLtBYaxIGKj0nHR-H1bZ2wlg1Ibj4u_uSHPqdqBlbV6Rdve3w2kF4pW_C3n0CwOKcdg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4IHvSkBoy_7cGjg23tuu1IQILICAdIuJH19Q2NZBAdF_96226CMR68NU2TNq9pv7z2-75HyH3ANWoJ8_UfCXB4LKQjQWcpHpcxQOYJgZblOxaDGR_Og3mNPOy0MIhoyWfYMk37l6_WsDVPZe04ZBof9YV7EOisIizVWpUeznPjdreXdIyhnBFY-daI09RD_lE1xYJG_5gk39OVXJG31raQLfj85cT43_WckOZenkcnO-A5JTXMG2Q4eSmfk2inKIxwnvawsDyrnBpy-5ImljeJtLJUXdI0V3oQbvY9pjLa6qNJZv3HaXfgVIUSnFffZYWTAupEKIIgDTNPeZnLpJ_5nGEaMeARMo9noQAlXClDDhrkhQCN42AOcCg5OyP1fJ3jOaEQMD_VMVTCV1wwjFIVxBxVlinfgzC4IA0Th8Wm9MJYVCG4_Lv7jhwOpsloMXoaP1-RI7MrJX_rmtSL9y3eaEAv5K3dxy8qmZ_H
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+7th+International+Conference+on+Data+Science+and+Machine+Learning+Applications+%28CDMA%29&rft.atitle=Phishing+Attacks+Detection+using+Machine+Learning+and+Deep+Learning+Models&rft.au=Aljabri%2C+Malak&rft.au=Mirza%2C+Samiha&rft.date=2022-03-01&rft.pub=IEEE&rft.spage=175&rft.epage=180&rft_id=info:doi/10.1109%2FCDMA54072.2022.00034&rft.externalDocID=9736352