The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

被引:0
|
作者
Gopali, Saroj [1 ]
Namin, Akbar S. [1 ]
Abri, Faranak [2 ]
Jones, Keith S. [3 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] San Jose State Univ, Dept Comp Sci, San Jose, CA USA
[3] Texas Tech Univ, Dept Psychol, Lubbock, TX USA
基金
美国国家科学基金会;
关键词
Phishing Website; Contextual Features of URLs; Deep learning models; Multi-Head Attention; TCN; LSTM; BiLSTM;
D O I
10.1145/3605098.3636164
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cyber attacks continue to pose significant threats to individuals and organizations, stealing sensitive data such as personally identifiable information, financial information, and login credentials. Hence, detecting malicious websites before they cause any harm is critical to preventing fraud and monetary loss. To address the increasing number of phishing attacks, protective mechanisms must be highly responsive, adaptive, and scalable. Fortunately, advances in the field of machine learning, coupled with access to vast amounts of data, have led to the adoption of various deep learning models for timely detection of these cyber crimes. This study focuses on the detection of phishing websites using deep learning models such as Multi-Head Attention, Temporal Convolutional Network (TCN), BI-LSTM, and LSTM where URLs of the phishing websites are treated as a sequence. The results demonstrate that Multi-Head Attention and BI-LSTM model outperform some other deep learning-based algorithms such as TCN and LSTM in producing better precision, recall, and F1-scores.
引用
收藏
页码:1064 / 1066
页数:3
相关论文
共 50 条
  • [41] Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models
    Jha, Birendra
    Atre, Medha
    Rao, Ashwini
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 130 - 139
  • [42] Phishing Attacks Detection using Machine Learning and Deep Learning Models
    Aljabri, Malak
    Mirza, Samiha
    2022 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND MACHINE LEARNING APPLICATIONS (CDMA 2022), 2022, : 175 - 180
  • [43] Phishing URL Detection using Deep Learning with CNN Models
    Alsadig, Alsadig Hadi
    Ahmad, Md Ogail
    2024 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT CYBER PHYSICAL SYSTEMS AND INTERNET OF THINGS, ICOICI 2024, 2024, : 768 - 775
  • [44] An Assessment of Features Related to Phishing Websites using an Automated Technique
    Mohammad, Rami M.
    Thabtah, Fadi
    McCluskey, Lee
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 492 - 497
  • [45] A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link
    Zaimi, Rania
    Hafidi, Mohamed
    Lamia, Mahnane
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (12): : 17159 - 17191
  • [46] Sarcasm Detection Using Deep Learning With Contextual Features
    Razali, Md Saifullah
    Halin, Alfian Abdul
    Ye, Lei
    Doraisamy, Shyamala
    Norowi, Noris Mohd
    IEEE ACCESS, 2021, 9 : 68609 - 68618
  • [47] An Approach to Detect Phishing Websites with Features Selection Method and Ensemble Learning
    Khatun, Mahmuda
    Mozumder, Md Akib Ikbal
    Polash, Md. Nazmul Hasan
    Hasan, Md Rakib
    Ahammad, Khalil
    Shaiham, Md Shibly
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (08) : 768 - 775
  • [48] Detecting Malicious URLs using Machine Learning Techniques
    Vanhoenshoven, Frank
    Napoles, Gonzalo
    Falcon, Rafael
    Vanhoof, Keen
    Koppen, Mario
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [49] Deep-learning-based sequential phishing detection
    Ogawa, Yuji
    Kimura, Tomotaka
    Cheng, Jun
    IEICE COMMUNICATIONS EXPRESS, 2022, 11 (04): : 171 - 175
  • [50] Detecting Malicious Websites by Learning IP Address Features
    Chiba, Daiki
    Tobe, Kazuhiro
    Mori, Tatsuya
    Goto, Shigeki
    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 29 - 39