Phishing Attacks Detection A Machine Learning-Based Approach

被引:11
|
作者
Salahdine, Fatima [1 ,2 ]
El Mrabet, Zakaria [1 ]
Kaabouch, Naima [1 ]
机构
[1] Univ North Dakota, Sch Elect Engn & Comp Sci, Grand Forks, ND 58203 USA
[2] Univ N Carolina, Dept Elect & Comp Engn, Charlotte, NC 28223 USA
关键词
Security; Phishing attacks; Machine learning;
D O I
10.1109/UEMCON53757.2021.9666627
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attacks are one of the most common social engineering attacks targeting users' emails to fraudulently steal confidential and sensitive information. They can be used as a part of more massive attacks launched to gain a foothold in corporate or government networks. Over the last decade, a number of anti-phishing techniques have been proposed to detect and mitigate these attacks. However, they are still inefficient and inaccurate. Thus, there is a great need for efficient and accurate detection techniques to cope with these attacks. In this paper, we proposed a phishing attack detection technique based on machine learning. We collected and analyzed more than 4000 phishing emails targeting the email service of the University of North Dakota. We modeled these attacks by selecting 10 relevant features and building a large dataset. This dataset was used to train, validate, and test the machine learning algorithms. For performance evaluation, four metrics have been used, namely probability of detection, probability of miss-detection, probability of false alarm, and accuracy. The experimental results show that better detection can be achieved using an artificial neural network.
引用
收藏
页码:250 / 255
页数:6
相关论文
共 50 条
  • [31] Machine learning based phishing detection from URLs
    Sahingoz, Ozgur Koray
    Buber, Ebubekir
    Demir, Onder
    Diri, Banu
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 117 : 345 - 357
  • [32] A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning
    Barlow, Luke
    Bendiab, Gueltoum
    Shiaeles, Stavros
    Savage, Nick
    2020 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2020, : 177 - 182
  • [33] Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles
    He, Qiyi
    Meng, Xiaolin
    Qu, Rong
    Xi, Ruijie
    MATHEMATICS, 2020, 8 (08)
  • [34] A machine learning-based intrusion detection for detecting internet of things network attacks
    Saheed, Yakub Kayode
    Abiodun, Aremu Idris
    Misra, Sanjay
    Holone, Monica Kristiansen
    Colomo-Palacios, Ricardo
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 9395 - 9409
  • [35] Machine Learning-Based Intrusion Detection for Rare-Class Network Attacks
    Yang, Yu
    Gu, Yuheng
    Yan, Yu
    ELECTRONICS, 2023, 12 (18)
  • [36] Rigorous Evaluation of Machine Learning-based Intrusion Detection Against Adversarial Attacks
    Gungor, Onat
    Li, Elvin
    Shang, Zhengli
    Guo, Yutong
    Chen, Jing
    Davis, Johnathan
    Rosing, Tajana
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 152 - 158
  • [37] SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN
    Xu, Yuwei
    Zhang, Tiantian
    Zeng, Junyu
    Wang, Rongrong
    Song, Kehui
    Xu, Jingdong
    UBIQUITOUS SECURITY, UBISEC 2023, 2024, 2034 : 236 - 252
  • [38] Using Graph Theory for Improving Machine Learning-based Detection of Cyber Attacks
    Zonneveld, Giacomo
    Principi, Lorenzo
    Baldi, Marco
    2024 IEEE 25TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING, HPSR 2024, 2024, : 191 - 196
  • [39] Feature Selection For Machine Learning-Based Early Detection of Distributed Cyber Attacks
    Feng, Yaokai
    Akiyama, Hitoshi
    Lu, Liang
    Sakurai, Kouichi
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 173 - 180
  • [40] Phishing Website Detection Based on Machine Learning: A Survey
    Singh, Charu
    Meenu
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 398 - 404