Phishing Detection Using Machine Learning Techniques
- URL: http://arxiv.org/abs/2009.11116v1
- Date: Sun, 20 Sep 2020 11:52:52 GMT
- Title: Phishing Detection Using Machine Learning Techniques
- Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi
- Abstract summary: Phishers try to deceive their victims by social engineering or creating mock-up websites to steal information.
One of the most successful methods for detecting these malicious activities is Machine Learning.
In this paper, we compared the results of multiple machine learning methods for predicting phishing websites.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The Internet has become an indispensable part of our life, However, It also
has provided opportunities to anonymously perform malicious activities like
Phishing. Phishers try to deceive their victims by social engineering or
creating mock-up websites to steal information such as account ID, username,
password from individuals and organizations. Although many methods have been
proposed to detect phishing websites, Phishers have evolved their methods to
escape from these detection methods. One of the most successful methods for
detecting these malicious activities is Machine Learning. This is because most
Phishing attacks have some common characteristics which can be identified by
machine learning methods. In this paper, we compared the results of multiple
machine learning methods for predicting phishing websites.
Related papers
- Deepfake detection in videos with multiple faces using geometric-fakeness features [79.16635054977068]
Deepfakes of victims or public figures can be used by fraudsters for blackmailing, extorsion and financial fraud.
In our research we propose to use geometric-fakeness features (GFF) that characterize a dynamic degree of a face presence in a video.
We employ our approach to analyze videos with multiple faces that are simultaneously present in a video.
arXiv Detail & Related papers (2024-10-10T13:10:34Z) - Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning [50.79277723970418]
imitation attacks can lead to erroneous identification and subsequent authentication of attackers.
Similar to face recognition, imitation attacks can also be detected with Machine Learning.
We propose a novel approach that promises high classification accuracy by combining previously unused features with time-aware deep learning strategies.
arXiv Detail & Related papers (2024-08-27T07:26:10Z) - Verification of Machine Unlearning is Fragile [48.71651033308842]
We introduce two novel adversarial unlearning processes capable of circumventing both types of verification strategies.
This study highlights the vulnerabilities and limitations in machine unlearning verification, paving the way for further research into the safety of machine unlearning.
arXiv Detail & Related papers (2024-08-01T21:37:10Z) - Phishing Website Detection Using a Combined Model of ANN and LSTM [0.9208007322096533]
phishing is a type of cybercrime, which has the purpose of stealing the personal information of the computer user.
The attackers used personal information like account IDs, passwords, and usernames for the purpose of some fraudulent activities against the user of the computer.
To overcome this problem researchers focused on the machine learning and deep learning approaches.
arXiv Detail & Related papers (2024-03-24T14:46:02Z) - "Do Users fall for Real Adversarial Phishing?" Investigating the Human response to Evasive Webpages [7.779975012737389]
State-of-the-art solutions entail the application of machine learning to detect phishing websites by checking if they visually resemble webpages of well-known brands.
Some security companies began to deploy them also in their phishing detection systems (PDS)
In this paper, we scrutinize whether 'genuine phishing websites' that evade 'commercial ML-based PDS' represent a problem "in reality"
arXiv Detail & Related papers (2023-11-28T00:08:48Z) - Phishing URL Detection: A Network-based Approach Robust to Evasion [17.786802845563745]
We present a network-based inference method to accurately detect phishing URLs camouflaged with legitimate patterns.
Our method consistently shows better detection performance throughout various experimental tests than state-of-the-art methods.
arXiv Detail & Related papers (2022-09-03T16:09:05Z) - Phishing Attacks Detection -- A Machine Learning-Based Approach [0.6445605125467573]
Phishing attacks are one of the most common social engineering attacks targeting users emails to fraudulently steal confidential and sensitive information.
In this paper, we proposed a phishing attack detection technique based on machine learning.
We collected and analyzed more than 4000 phishing emails targeting the email service of the University of North Dakota.
arXiv Detail & Related papers (2022-01-26T05:08:27Z) - Deep convolutional forest: a dynamic deep ensemble approach for spam
detection in text [219.15486286590016]
This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically.
As a result, the model achieved high precision, recall, f1-score and accuracy of 98.38%.
arXiv Detail & Related papers (2021-10-10T17:19:37Z) - Detecting Phishing Sites -- An Overview [0.0]
Phishing is one of the most severe cyber-attacks where researchers are interested to find a solution.
To minimize the damage caused by phishing must be detected as early as possible.
There are various phishing detection techniques based on white-list, black-list, content-based, URL-based, visual-similarity and machine-learning.
arXiv Detail & Related papers (2021-03-23T19:16:03Z) - Being Single Has Benefits. Instance Poisoning to Deceive Malware
Classifiers [47.828297621738265]
We show how an attacker can launch a sophisticated and efficient poisoning attack targeting the dataset used to train a malware classifier.
As opposed to other poisoning attacks in the malware detection domain, our attack does not focus on malware families but rather on specific malware instances that contain an implanted trigger.
We propose a comprehensive detection approach that could serve as a future sophisticated defense against this newly discovered severe threat.
arXiv Detail & Related papers (2020-10-30T15:27:44Z) - Phishing and Spear Phishing: examples in Cyber Espionage and techniques
to protect against them [91.3755431537592]
Phishing attacks have become the most used technique in the online scams, initiating more than 91% of cyberattacks, from 2012 onwards.
This study reviews how Phishing and Spear Phishing attacks are carried out by the phishers, through 5 steps which magnify the outcome.
arXiv Detail & Related papers (2020-05-31T18:10:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.