Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
41 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
41 tokens/sec
o3 Pro
7 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs (2404.09802v1)

Published 15 Apr 2024 in cs.CR and cs.LG

Abstract: Cyber attacks continue to pose significant threats to individuals and organizations, stealing sensitive data such as personally identifiable information, financial information, and login credentials. Hence, detecting malicious websites before they cause any harm is critical to preventing fraud and monetary loss. To address the increasing number of phishing attacks, protective mechanisms must be highly responsive, adaptive, and scalable. Fortunately, advances in the field of machine learning, coupled with access to vast amounts of data, have led to the adoption of various deep learning models for timely detection of these cyber crimes. This study focuses on the detection of phishing websites using deep learning models such as Multi-Head Attention, Temporal Convolutional Network (TCN), BI-LSTM, and LSTM where URLs of the phishing websites are treated as a sequence. The results demonstrate that Multi-Head Attention and BI-LSTM model outperform some other deep learning-based algorithms such as TCN and LSTM in producing better precision, recall, and F1-scores.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (12)
  1. Classifying phishing URLs using recurrent neural networks. In 2017 APWG symposium on electronic crime research (eCrime).
  2. Moitrayee Chatterjee and Akbar Siami Namin. 2019. Detecting Phishing Websites through Deep Reinforcement Learning. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Vol. 2. 227–232.
  3. Francois Chollet et al. 2015. Keras. https://github.com/fchollet/keras
  4. EBUBEKIRBBR. 2021. ebubekirbbr/pdd: Personal Data Detector. Githubrepository Accessed on March 29, 2023.
  5. Ismail Fahmi and Gosse Bouma. 2006. Learning to identify definitions using syntactic features. In Proceedings of the Workshop on Learning Structured Information in Natural Language Applications.
  6. FBI. 2023. IC3 Annual Reports. https://www.ic3.gov/Home/AnnualReports Accessed: April 4, 2023.
  7. Ankit Kumar Jain and Brij B Gupta. 2016. A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP Journal on Information Security 2016 (2016), 1–11.
  8. Comparison of deep learning models and various text pre-processing techniques for the toxic comments classification. Applied Sciences 10, 23 (2020).
  9. Natural language processing: an introduction. Journal of the American Medical Informatics Association 18, 5 (2011), 544–551.
  10. Detecting Phishing URLs using the BERT Transformer Models. In IEEE BigData.
  11. The Application of the BERT Transformer Model for Phishing Email Classification. In IEEE COMPSAC.
  12. Phishing website detection based on multidimensional features driven by deep learning. IEEE Access 7 (2019).
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Saroj Gopali (4 papers)
  2. Akbar S. Namin (1 paper)
  3. Faranak Abri (13 papers)
  4. Keith S. Jones (10 papers)
Citations (4)