Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3605098.3636164acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

Published: 21 May 2024 Publication History

Abstract

Cyber attacks continue to pose significant threats to individuals and organizations, stealing sensitive data such as personally identifiable information, financial information, and login credentials. Hence, detecting malicious websites before they cause any harm is critical to preventing fraud and monetary loss. To address the increasing number of phishing attacks, protective mechanisms must be highly responsive, adaptive, and scalable. Fortunately, advances in the field of machine learning, coupled with access to vast amounts of data, have led to the adoption of various deep learning models for timely detection of these cyber crimes. This study focuses on the detection of phishing websites using deep learning models such as Multi-Head Attention, Temporal Convolutional Network (TCN), BI-LSTM, and LSTM where URLs of the phishing websites are treated as a sequence. The results demonstrate that Multi-Head Attention and BI-LSTM model outperform some other deep learning-based algorithms such as TCN and LSTM in producing better precision, recall, and F1-scores.

References

[1]
Alejandro Correa Bahnsen, Eduardo Contreras Bohorquez, Sergio Villegas, Javier Vargas, and Fabio A González. 2017. Classifying phishing URLs using recurrent neural networks. In 2017 APWG symposium on electronic crime research (eCrime).
[2]
Moitrayee Chatterjee and Akbar Siami Namin. 2019. Detecting Phishing Websites through Deep Reinforcement Learning. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Vol. 2. 227--232.
[3]
Francois Chollet et al. 2015. Keras. https://github.com/fchollet/keras
[4]
EBUBEKIRBBR. 2021. ebubekirbbr/pdd: Personal Data Detector. Githubrepository Accessed on March 29, 2023.
[5]
Ismail Fahmi and Gosse Bouma. 2006. Learning to identify definitions using syntactic features. In Proceedings of the Workshop on Learning Structured Information in Natural Language Applications.
[6]
FBI. 2023. IC3 Annual Reports. https://www.ic3.gov/Home/AnnualReports Accessed: April 4, 2023.
[7]
Ankit Kumar Jain and Brij B Gupta. 2016. A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP Journal on Information Security 2016 (2016), 1--11.
[8]
Viera Maslej-Krešňáková, Martin Sarnovskỳ, Peter Butka, and Kristína Machová. 2020. Comparison of deep learning models and various text pre-processing techniques for the toxic comments classification. Applied Sciences 10, 23 (2020).
[9]
Prakash M Nadkarni, Lucila Ohno-Machado, and Wendy W Chapman. 2011. Natural language processing: an introduction. Journal of the American Medical Informatics Association 18, 5 (2011), 544--551.
[10]
DO Otieno, Faranak Abri, AS Namin, and KS Jones. 2023. Detecting Phishing URLs using the BERT Transformer Models. In IEEE BigData.
[11]
DO Otieno, AS Namin, and KS Jones. 2023. The Application of the BERT Transformer Model for Phishing Email Classification. In IEEE COMPSAC.
[12]
Peng Yang, Guangzhen Zhao, and Peng Zeng. 2019. Phishing website detection based on multidimensional features driven by deep learning. IEEE Access 7 (2019).

Index Terms

  1. The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing
    April 2024
    1898 pages
    ISBN:9798400702433
    DOI:10.1145/3605098
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 May 2024

    Check for updates

    Author Tags

    1. phishing website
    2. contextual features of URLs
    3. deep learning models
    4. multi-head attention
    5. TCN
    6. LSTM
    7. BiLSTM

    Qualifiers

    • Poster

    Conference

    SAC '24
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 26
      Total Downloads
    • Downloads (Last 12 months)26
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media