Analysis and Prevention of AI-Based Phishing Email Attacks

被引:2
|
作者
Eze, Chibuike Samuel [1 ]
Shamir, Lior [1 ]
机构
[1] Kansas State Univ, Dept Comp Sci, Manhattan, KS 66506 USA
关键词
phishing; cybersecurity; SPAM;
D O I
10.3390/electronics13101839
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing email attacks are among the most common and most harmful cybersecurity attacks. With the emergence of generative AI, phishing attacks can be based on emails generated automatically, making it more difficult to detect them. That is, instead of a single email format sent to a large number of recipients, generative AI can be used to send each potential victim a different email, making it more difficult for cybersecurity systems to identify the scam email before it reaches the recipient. Here, we describe a corpus of AI-generated phishing emails. We also use different machine learning tools to test the ability of automatic text analysis to identify AI-generated phishing emails. The results are encouraging, and show that machine learning tools can identify an AI-generated phishing email with high accuracy compared to regular emails or human-generated scam emails. By applying descriptive analytics, the specific differences between AI-generated emails and manually crafted scam emails are profiled and show that AI-generated emails are different in their style from human-generated phishing email scams. Therefore, automatic identification tools can be used as a warning for the user. The paper also describes the corpus of AI-generated phishing emails that are made open to the public and can be used for consequent studies. While the ability of machine learning to detect AI-generated phishing emails is encouraging, AI-generated phishing emails are different from regular phishing emails, and therefore, it is important to train machine learning systems also with AI-generated emails in order to repel future phishing attacks that are powered by generative AI.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    ELECTRONICS, 2022, 11 (23)
  • [32] A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
    Barik, Kousik
    Misra, Sanjay
    Sanz, Luis Fernandez
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2024, 17 (01)
  • [33] BACAD: AI-based framework for detecting vertical broken access control attacks
    Anas, Ahmed
    Alhelbawy, Ayman A.
    El Gamal, Salwa
    Youssef, Basheer
    EGYPTIAN INFORMATICS JOURNAL, 2024, 28
  • [34] Detection and prevention of spear phishing attacks: A comprehensive survey
    Birthriya, Santosh Kumar
    Ahlawat, Priyanka
    Jain, Ankit Kumar
    COMPUTERS & SECURITY, 2025, 151
  • [35] Explainable AI-Based DDoS Attacks Classification Using Deep Transfer Learning
    Alzu'bi, Ahmad
    Albashayreh, Amjad
    Abuarqoub, Abdelrahman
    Alfawair, Mai A. M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (03): : 3785 - 3802
  • [36] Detection method of phishing email based on persuasion principle
    Li, Xue
    Zhang, Dongmei
    Wu, Bin
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 571 - 574
  • [37] Online Detection and Prevention of Phishing Attacks (Invited Paper)
    Chen, Juan
    Guo, Chuanxiong
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [38] Phishing attacks: An analysis of the victims' characteristics based on administrative data
    Fedele, Alessandro
    Tonin, Mirco
    Valerio, Matteo
    ECONOMICS LETTERS, 2024, 237
  • [39] LSTM Based Phishing Detection for Big Email Data
    Li, Qi
    Cheng, Mingyu
    Wang, Junfeng
    Sun, Bowen
    IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (01) : 278 - 288
  • [40] Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks
    Islam, Md Mazharul
    Al-Shaer, Ehab
    Rahim, Muhammad Abdul Basit Ur
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I, 2020, 335 : 1 - 22