Skip to main navigation menu Skip to main content Skip to site footer

Web Phishing Detection Using Web Crawling, Cloud Infrastructure and Deep Learning Framework

Abstract

The pandemic of COVID-19 obliges citizens to follow the “work from home “scheme. The Internet is also a powerful channel for social connections. The huge dependency of people on digital media opens doors to fraud. Phishing is a form of cybercrime that is used to rob users of passwords from online banking, e-commerce, online schools, digital markets, and others. Phishers create bogus websites like the original and deliver users spam mails. When an online user visits fake web pages via spam, phishers steal their credentials. As a result, it is important to identify these forms of fraudulent websites until they do any harm to victims. Inspired by the ever-changing existence of phishing websites. This paper reviews the work on Phishing attack detection and aims to examine techniques that mainly detect and help in preventing phishing attacks rather than mitigating them. Here we offered a general overview of the most effective phishing attack detection strategies focused on deep learning.

Keywords

Phishing, Phishing Website, Phishing Attacks, Phishing Detection, Deep Learning

PDF

References

  1. R. R. Zebari, S. R. Zeebaree, and K. Jacksi, "Impact analysis of HTTP and SYN flood DDoS attacks on apache 2 and IIS 10.0 Web servers," in 2018 International Conference on Advanced Science and Engineering (ICOASE), 2018, pp. 156-161.
  2. S. R. Zeebaree, K. Jacksi, and R. R. Zebari, "Impact analysis of SYN flood DDoS attack on HAProxy and NLB cluster-based web servers," Indones. J. Electr. Eng. Comput. Sci, vol. 19, pp. 510-517, 2020.
  3. O. H. Jader, S. Zeebaree, and R. R. Zebari, "A state of art survey for web server performance measurement and load balancing mechanisms," International Journal of Scientific & Technology Research, vol. 8, pp. 535-543, 2019.
  4. P. Y. Abdullah, S. Zeebaree, K. Jacksi, and R. R. Zeabri, "An hrm system for small and medium enterprises (sme) s based on cloud computing technology," International Journal of Research-GRANTHAALAYAH, vol. 8, pp. 56-64, 2020.
  5. W. H. Lim, W. F. Liew, C. Y. Lum, and S. F. Lee, "Phishing security: Attack, detection, and prevention mechanisms," ed, 2020.
  6. R. R. Zebari, S. Zeebaree, K. Jacksi, and H. M. Shukur, "E-business requirements for flexibility and implementation enterprise system: A review," International Journal of Scientific & Technology Research, vol. 8, pp. 655-660, 2019.
  7. S. Zeebaree, L. M. Haji, I. Rashid, R. R. Zebari, O. M. Ahmed, K. Jacksi, et al., "Multicomputer multicore system influence on maximum multi-processes execution time," TEST Engineering & Management, vol. 83, pp. 14921-14931, 2020.
  8. S. Zeebaree, R. R. Zebari, K. Jacksi, and D. A. Hasan, "Security Approaches For Integrated Enterprise Systems Performance: A Review," Int. J. Sci. Technol. Res, vol. 8, 2019.
  9. S. Gupta, A. Singhal, and A. Kapoor, "A literature survey on social engineering attacks: Phishing attack," in 2016 international conference on computing, communication and automation (ICCCA), 2016, pp. 537-540.
  10. H. Dino, M. B. Abdulrazzaq, S. Zeebaree, A. B. Sallow, R. R. Zebari, H. M. Shukur, et al., "Facial expression recognition based on hybrid feature extraction techniques with different classifiers," TEST Engineering & Management, vol. 83, pp. 22319-22329, 2020.
  11. K. Jacksi, R. K. Ibrahim, S. R. Zeebaree, R. R. Zebari, and M. A. Sadeeq, "Clustering documents based on semantic similarity using HAC and K-mean algorithms," in 2020 International Conference on Advanced Science and Engineering (ICOASE), 2020, pp. 205-210.
  12. S. R. Zeebaree, H. M. Shukur, L. M. Haji, R. R. Zebari, K. Jacksi, and S. M. Abas, "Characteristics and analysis of hadoop distributed systems," Technology Reports of Kansai University, vol. 62, pp. 1555-1564, 2020.
  13. M. B. Abdulrazaq, M. R. Mahmood, S. R. Zeebaree, M. H. Abdulwahab, R. R. Zebari, and A. B. Sallow, "An analytical appraisal for supervised classifiers’ performance on facial expression recognition based on relief-F feature selection," in Journal of Physics: Conference Series, 2021, p. 012055.
  14. H. Malallah, S. Zeebaree, R. R. Zebari, M. Sadeeq, Z. S. Ageed, I. M. Ibrahim, et al., "A comprehensive study of kernel (issues and concepts) in different operating systems," Asian Journal of Research in Computer Science, vol. 8, pp. 16-31, 2021.
  15. D. A. Hasan, S. R. Zeebaree, M. A. Sadeeq, H. M. Shukur, R. R. Zebari, and A. H. Alkhayyat, "Machine Learning-based Diabetic Retinopathy Early Detection and Classification Systems-A Survey," in 2021 1st Babylon International Conference on Information Technology and Science (BICITS), 2021, pp. 16-21.
  16. A. B. Sallow, S. R. Zeebaree, R. R. Zebari, M. R. Mahmood, M. B. Abdulrazzaq, and M. A. Sadeeq, "Vaccine tracker/SMS reminder system: design and implementation," ISSN (Online), pp. 2581-6187, 2020.
  17. H. Shukur, S. Zeebaree, R. Zebari, O. Ahmed, L. Haji, and D. Abdulqader, "Cache coherence protocols in distributed systems," Journal of Applied Science and Technology Trends, vol. 1, pp. 92-97, 2020.
  18. M. R. Mahmood, M. B. Abdulrazzaq, S. Zeebaree, A. K. Ibrahim, R. R. Zebari, and H. I. Dino, "Classification techniques’ performance evaluation for facial expression recognition," Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, pp. 176-1184, 2021.
  19. B. R. Ibrahim, F. M. Khalifa, S. R. Zeebaree, N. A. Othman, A. Alkhayyat, R. R. Zebari, et al., "Embedded system for eye blink detection using machine learning technique," in 2021 1st Babylon International Conference on Information Technology and Science (BICITS), 2021, pp. 58-62.
  20. Z. A. Younis, A. M. Abdulazeez, S. R. Zeebaree, R. R. Zebari, and D. Q. Zeebaree, "Mobile Ad Hoc Network in Disaster Area Network Scenario: A Review on Routing Protocols," International Journal of Online & Biomedical Engineering, vol. 17, 2021.
  21. C. Singh, "Phishing website detection based on machine learning: A survey," in 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020, pp. 398-404.
  22. H. I. Dino, S. Zeebaree, O. M. Ahmad, H. M. Shukur, R. R. Zebari, and L. M. Haji, "Impact of load sharing on performance of distributed systems computations," International Journal of Multidisciplinary Research and Publications (IJMRAP), vol. 3, pp. 30-37, 2020.
  23. H. M. Shukur, S. R. Zeebaree, R. R. Zebari, B. K. Hussan, O. H. Jader, and L. M. Haji, "Design and implementation of electronic enterprise university human resource management system," in Journal of Physics: Conference Series, 2021, p. 012058.
  24. R. R. Zebari, S. R. Zeebaree, A. B. Sallow, H. M. Shukur, O. M. Ahmad, and K. Jacksi, "Distributed denial of service attack mitigation using high availability proxy and network load balancing," in 2020 International Conference on Advanced Science and Engineering (ICOASE), 2020, pp. 174-179.
  25. R. S. Rao and A. R. Pais, "Detection of phishing websites using an efficient feature-based machine learning framework," Neural Computing and Applications, vol. 31, pp. 3851-3873, 2019.
  26. H. I. Dino, S. Zeebaree, A. A. Salih, R. R. Zebari, Z. S. Ageed, H. M. Shukur, et al., "Impact of Process Execution and Physical Memory-Spaces on OS Performance," Technology Reports of Kansai University, vol. 62, pp. 2391-2401, 2020.
  27. L. Haji, R. Zebari, S. Zeebaree, W. Abduallah, H. Shukur, and O. Ahmed, "GPUs impact on parallel shared memory systems performance," Int. J. Psychosoc. Rehabil, vol. 24, pp. 8030-8038, 2019.
  28. K. H. Sharif, S. R. Zeebaree, L. M. Haji, and R. R. Zebari, "Performance measurement of processes and threads controlling, tracking and monitoring based on shared-memory parallel processing approach," in 2020 3rd International Conference on Engineering Technology and its Applications (IICETA), 2020, pp. 62-67.
  29. G. D. L. T. Parra, P. Rad, K.-K. R. Choo, and N. Beebe, "Detecting Internet of Things attacks using distributed deep learning," Journal of Network and Computer Applications, vol. 163, p. 102662, 2020.
  30. L. Haji, R. Zebari, S. Zeebaree, M. WAFAA, H. Shukur, and O. Alzakholi, "GPUs Impact on Parallel Shared Memory Systems Performance–International Journal of Psychosocial Rehabilitation," ed: May, 2020.
  31. G. M. Zebari, S. Zeebaree, M. M. Sadeeq, and R. Zebari, "Predicting Football Outcomes by Using Poisson Model: Applied to Spanish Primera División," Journal of Applied Science and Technology Trends, vol. 2, pp. 105-112, 2021.
  32. P. RAJKUMAR and S. k. VENKATESH, "A Survey on Data Mining Techniques for Website Phishing Detection," International Journal of Pure and Applied Mathematics, vol. 119, pp. 2127-2133, 2018.
  33. K. P. M. Kumar, J. Mahilraj, D. Swathi, R. Rajavarman, S. R. Zeebaree, R. R. Zebari, et al., "Privacy Preserving Blockchain with Optimal Deep Learning Model for Smart Cities," CMC-COMPUTERS MATERIALS & CONTINUA, vol. 73, pp. 5299-5314, 2022.
  34. Z. N. Rashid, S. R. Zeebaree, R. R. Zebari, S. H. Ahmed, H. M. Shukur, and A. Alkhayyat, "Distributed and Parallel Computing System Using Single-Client Multi-Hash Multi-Server Multi-Thread," in 2021 1st Babylon International Conference on Information Technology and Science (BICITS), 2021, pp. 222-227.
  35. R. R. Zebari, S. R. Zeebaree, Z. N. Rashid, H. M. Shukur, A. Alkhayyat, and M. A. Sadeeq, "A Review on Automation Artificial Neural Networks based on Evolutionary Algorithms," in 2021 14th International Conference on Developments in eSystems Engineering (DeSE), 2021, pp. 235-240.
  36. P. Kalaharsha and B. Mehtre, "Detecting Phishing Sites--An Overview," arXiv preprint arXiv:2103.12739, 2021.
  37. Z. N. Rashid, S. R. Zeebaree, M. A. Sadeeq, R. R. Zebari, H. M. Shukur, and A. Alkhayyat, "Cloud-based Parallel Computing System Via Single-Client Multi-Hash Single-Server Multi-Thread," in 2021 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), 2021, pp. 59-64.
  38. O. H. Jader, S. R. Zeebaree, R. R. Zebari, H. M. Shukur, Z. N. Rashid, M. A. Sadeeq, et al., "Ultra-Dense Request Impact on Cluster-Based Web Server Performance," in 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA), 2021, pp. 252-257.
  39. M. Khonji, Y. Iraqi, and A. Jones, "Phishing detection: a literature survey," IEEE Communications Surveys & Tutorials, vol. 15, pp. 2091-2121, 2013.
  40. A. S. Abdulraheem, A. I. Abdulla, and S. M. Mohammed, "Enterprise resource planning systems and challenges," Technology Reports of Kansai University, vol. 62, pp. 1885-1894, 2020.
  41. B. W. SALIM and S. R. ZEEBAREE, "ISOLATED AND CONTINUOUS HAND GESTURE RECOGNITION BASED ON DEEP LEARNING: A REVIEW."
  42. F. Abedi, S. R. Zeebaree, Z. S. Ageed, H. M. Ghanimi, A. Alkhayyat, M. A. Sadeeq, et al., "Severity Based Light-Weight Encryption Model for Secure Medical Information System."
  43. V. D. Majety, N. Sharmili, C. R. Pattanaik, E. L. Lydia, S. R. Zeebaree, S. N. Mahmood, et al., "Ensemble of Handcrafted and Deep Learning Model for Histopathological Image Classification," CMC-COMPUTERS MATERIALS & CONTINUA, vol. 73, pp. 4393-4406, 2022.
  44. A. M. Abed, Z. N. Rashid, F. Abedi, S. R. Zeebaree, M. A. Sahib, A. J. a. Mohamad Jawad, et al., "Trajectory tracking of differential drive mobile robots using fractional-order proportional-integral-derivative controller design tuned by an enhanced fruit fly optimization," Measurement and Control, vol. 55, pp. 209-226, 2022.
  45. H. B. Abdalla, A. M. Ahmed, S. R. Zeebaree, A. Alkhayyat, and B. Ihnaini, "Rider weed deep residual network-based incremental model for text classification using multidimensional features and MapReduce," PeerJ Computer Science, vol. 8, p. e937, 2022.
  46. A. S. Aljuboury, S. R. Zeebaree, F. Abedi, Z. S. Hashim, R. Q. Malik, I. K. Ibraheem, et al., "A New Nonlinear Controller Design for a TCP/AQM Network Based on Modified Active Disturbance Rejection Control," Complexity, vol. 2022, 2022.
  47. S. Chavhan, S. R. Zeebaree, A. Alkhayyat, and S. Kumar, "Design of Space Efficient Electric Vehicle Charging Infrastructure Integration Impact on Power Grid Network," Mathematics, vol. 10, p. 3450, 2022.
  48. Y. S. Jghef, M. J. M. Jasim, H. M. Ghanimi, A. D. Algarni, N. F. Soliman, W. El-Shafai, et al., "Bio-Inspired Dynamic Trust and Congestion-Aware Zone-Based Secured Internet of Drone Things (SIoDT)," Drones, vol. 6, p. 337, 2022.
  49. G. M. O. Zebari, K. Faraj, and S. Zeebaree, "Hand writing code-php or wire shark ready application over tier architecture with windows servers operating systems or linux server operating systems," International Journal of Computer Sciences and Engineering, vol. 4, pp. 142-149, 2016.
  50. R. Ibrahim, S. R. Zeebaree, and K. Jacksi, "Semantic Similarity for Document Clustering using TFIDF and K-mean," Master’s Thesis, 2020.
  51. B. W. Salim and S. R. Zeebaree, "Design & Analyses of a Novel Real Time Kurdish Sign Language for Kurdish Text and Sound Translation System," in 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020, pp. 348-352.
  52. S. M. Saleem, S. R. Zeebaree, and M. B. Abdulrazzaq, "Real-life dynamic facial expression recognition: A review," in Journal of Physics: Conference Series, 2021, p. 012010.
  53. R. K. Ibrahim, S. R. Zeebaree, K. Jacksi, M. A. Sadeeq, H. M. Shukur, and A. Alkhayyat, "Clustering document based semantic similarity system using TFIDF and k-mean," in 2021 International Conference on Advanced Computer Applications (ACA), 2021, pp. 28-33.
  54. S. Zebari, "A new approach for process monitoring," Polytechnic Journal, Technical Education-Erbil, 2011.
  55. K. B. Obaid, S. Zeebaree, and O. M. Ahmed, "Deep learning models based on image classification: a review," International Journal of Science and Business, vol. 4, pp. 75-81, 2020.
  56. S. Zebari and N. O. Yaseen, "Effects of parallel processing implementation on balanced load-division depending on distributed memory systems," J. Univ. Anbar Pure Sci, vol. 5, pp. 50-56, 2011.
  57. K. Jacksi, N. Dimililer, and S. R. Zeebaree, "A survey of exploratory search systems based on LOD resources," 2015.
  58. D. A. Zebari, H. Haron, S. R. Zeebaree, and D. Q. Zeebaree, "Multi-level of DNA encryption technique based on DNA arithmetic and biological operations," in 2018 International Conference on Advanced Science and Engineering (ICOASE), 2018, pp. 312-317.
  59. H. M. Yasin, S. R. Zeebaree, and I. M. Zebari, "Arduino based automatic irrigation system: Monitoring and SMS controlling," in 2019 4th Scientific International Conference Najaf (SICN), 2019, pp. 109-114.
  60. A. Zeebaree, A. Adel, K. Jacksi, and A. Selamat, "Designing an ontology of E-learning system for duhok polytechnic university using protégé OWL tool," J Adv Res Dyn Control Syst Vol, vol. 11, pp. 24-37, 2019.
  61. L. M. Haji, O. M. Ahmad, S. Zeebaree, H. I. Dino, R. R. Zebari, and H. M. Shukur, "Impact of cloud computing and internet of things on the future internet," Technology Reports of Kansai University, vol. 62, pp. 2179-2190, 2020.
  62. A. AL-Zebari, S. Zeebaree, K. Jacksi, and A. Selamat, "ELMS–DPU ontology visualization with Protégé VOWL and Web VOWL," Journal of Advanced Research in Dynamic and Control Systems, vol. 11, pp. 478-85, 2019.
  63. L. M. Abdulrahman, S. Zeebaree, S. F. Kak, M. Sadeeq, A. Adel, B. W. Salim, et al., "A state of art for smart gateways issues and modification," Asian Journal of Research in Computer Science, vol. 63, pp. 1-13, 2021.
  64. H. M. Yasin, S. Zeebaree, M. Sadeeq, S. Y. Ameen, I. M. Ibrahim, R. R. Zebari, et al., "IoT and ICT based smart water management, monitoring and controlling system: A review," Asian Journal of Research in Computer Science, vol. 8, pp. 42-56, 2021.
  65. K. Jacksi, S. R. Zeebaree, and N. Dimililer, "LOD Explorer: Presenting the Web of Data," Int. J. Adv. Comput. Sci. Appl. IJACSA, vol. 9, pp. 1-7, 2018.
  66. F. Q. Kareem, S. Zeebaree, H. I. Dino, M. Sadeeq, Z. N. Rashid, D. A. Hasan, et al., "A survey of optical fiber communications: challenges and processing time influences," Asian Journal of Research in Computer Science, pp. 48-58, 2021.
  67. A. B. Sallow, M. Sadeeq, R. R. Zebari, M. B. Abdulrazzaq, M. R. Mahmood, H. M. Shukur, et al., "An investigation for mobile malware behavioral and detection techniques based on android platform," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 22, pp. 14-20, 2020.
  68. B. T. Jijo, S. Zeebaree, R. R. Zebari, M. Sadeeq, A. B. Sallow, S. Mohsin, et al., "A comprehensive survey of 5G mm-wave technology design challenges," Asian Journal of Research in Computer Science, vol. 8, pp. 1-20, 2021.
  69. L. M. Haji, S. Zeebaree, O. M. Ahmed, A. B. Sallow, K. Jacksi, and R. R. Zeabri, "Dynamic resource allocation for distributed systems and cloud computing," TEST Engineering & Management, vol. 83, pp. 22417-22426, 2020.
  70. H. Shukur, S. R. Zeebaree, A. J. Ahmed, R. R. Zebari, O. Ahmed, B. S. A. Tahir, et al., "A state of art survey for concurrent computation and clustering of parallel computing for distributed systems," Journal of Applied Science and Technology Trends, vol. 1, pp. 148-154, 2020.
  71. H. Shukur, S. Zeebaree, R. Zebari, D. Zeebaree, O. Ahmed, and A. Salih, "Cloud computing virtualization of resources allocation for distributed systems," Journal of Applied Science and Technology Trends, vol. 1, pp. 98-105, 2020.
  72. A. A. Salih, S. Zeebaree, A. S. Abdulraheem, R. R. Zebari, M. Sadeeq, and O. M. Ahmed, "Evolution of mobile wireless communication to 5G revolution," Technology Reports of Kansai University, vol. 62, pp. 2139-2151, 2020.
  73. O. Alzakholi, H. Shukur, R. Zebari, S. Abas, and M. Sadeeq, "Comparison among cloud technologies and cloud performance," Journal of Applied Science and Technology Trends, vol. 1, pp. 40-47, 2020.
  74. M. M. Sadeeq, N. M. Abdulkareem, S. R. Zeebaree, D. M. Ahmed, A. S. Sami, and R. R. Zebari, "IoT and Cloud computing issues, challenges and opportunities: A review," Qubahan Academic Journal, vol. 1, pp. 1-7, 2021.
  75. A. A. Yazdeen, S. R. Zeebaree, M. M. Sadeeq, S. F. Kak, O. M. Ahmed, and R. R. Zebari, "FPGA implementations for data encryption and decryption via concurrent and parallel computation: A review," Qubahan Academic Journal, vol. 1, pp. 8-16, 2021.
  76. Z. N. Rashid, S. R. Zebari, K. H. Sharif, and K. Jacksi, "Distributed cloud computing and distributed parallel computing: A review," in 2018 International Conference on Advanced Science and Engineering (ICOASE), 2018, pp. 167-172.
  77. S. M. S. A. Abdullah, S. Y. A. Ameen, M. A. Sadeeq, and S. Zeebaree, "Multimodal emotion recognition using deep learning," Journal of Applied Science and Technology Trends, vol. 2, pp. 52-58, 2021.
  78. G. A. Akerlof and R. J. Shiller, "Phishing for phools," in Phishing for Phools, ed: Princeton University Press, 2015.
  79. A. Aleroud and L. Zhou, "Phishing environments, techniques, and countermeasures: A survey," Computers & Security, vol. 68, pp. 160-196, 2017.
  80. I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails," in Proceedings of the 16th international conference on World Wide Web, 2007, pp. 649-656.
  81. S. Sheng, B. Wardman, G. Warner, L. Cranor, J. Hong, and C. Zhang, "An empirical analysis of phishing blacklists," 2009.
  82. B. Parno, C. Kuo, and A. Perrig, "Phoolproof phishing prevention," in Financial Cryptography, 2006, pp. 1-19.
  83. Y. Zhang, S. Egelman, L. Cranor, and J. Hong, "Phinding phish: Evaluating anti-phishing tools," 2007.
  84. K. L. Chiew, K. S. C. Yong, and C. L. Tan, "A survey of phishing attacks: Their types, vectors and technical approaches," Expert Systems with Applications, vol. 106, pp. 1-20, 2018.
  85. Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, "Phishing attacks: A recent comprehensive study and a new anatomy," Frontiers in Computer Science, vol. 3, p. 563060, 2021.
  86. K. Jansson and R. von Solms, "Phishing for phishing awareness," Behaviour & information technology, vol. 32, pp. 584-593, 2013.
  87. J. Milletary and C. C. Center, "Technical trends in phishing attacks," Retrieved December, vol. 1, p. 3.3, 2005.
  88. A. Shankar, R. Shetty, and B. Nath, "A review on phishing attacks," International Journal of Applied Engineering Research, vol. 14, pp. 2171-2175, 2019.
  89. M. Dadkhah, M. D. Jazi, M. S. Mobarakeh, S. Shamshirband, X. Wang, and S. Raste, "An overview of phishing attacks and their detection techniques," International Journal of Internet Protocol Technology, vol. 9, pp. 187-195, 2016.
  90. V. Bhavsar, A. Kadlak, and S. Sharma, "Study on phishing attacks," Int. J. Comput. Appl, vol. 182, pp. 27-29, 2018.
  91. K. Gajera, M. Jangid, P. Mehta, and J. Mittal, "A novel approach to detect phishing attack using artificial neural networks combined with pharming detection," in 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), 2019, pp. 196-200.
  92. H. Zuhair, A. Selamat, and M. Salleh, "Feature selection for phishing detection: a review of research," International Journal of Intelligent Systems Technologies and Applications, vol. 15, pp. 147-162, 2016.
  93. Z. Futai, G. Yuxiang, P. Bei, P. Li, and L. Linsen, "Web phishing detection based on graph mining," in 2016 2nd IEEE international conference on computer and communications (ICCC), 2016, pp. 1061-1066.
  94. M. Vijayalakshmi, S. M. Shalinie, and M. H. Yang, "Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions," IET Networks, vol. 9, pp. 235-246, 2020.
  95. M. Baykara and Z. Z. Gürel, "Detection of phishing attacks," in 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018, pp. 1-5.
  96. T. Chin, K. Xiong, and C. Hu, "Phishlimiter: A phishing detection and mitigation approach using software-defined networking," IEEE Access, vol. 6, pp. 42516-42531, 2018.
  97. A. K. Jain and B. B. Gupta, "Phishing detection: analysis of visual similarity based approaches," Security and Communication Networks, vol. 2017, 2017.
  98. P. Pujara and M. Chaudhari, "Phishing website detection using machine learning: a review," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 3, pp. 395-399, 2018.
  99. P. Yi, Y. Guan, F. Zou, Y. Yao, W. Wang, and T. Zhu, "Web phishing detection using a deep learning framework," Wireless Communications and Mobile Computing, vol. 2018, 2018.
  100. N. Zhang and Y. Yuan, "Phishing detection using neural network," CS229 lecture notes, 2012.
  101. X. Xiao, D. Zhang, G. Hu, Y. Jiang, and S. Xia, "CNN–MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites," Neural Networks, vol. 125, pp. 303-312, 2020.
  102. S. Selvaganapathy, M. Nivaashini, and H. Natarajan, "Deep belief network based detection and categorization of malicious URLs," Information Security Journal: A Global Perspective, vol. 27, pp. 145-161, 2018.
  103. K. H. Park, E. Lee, and H. K. Kim, "Show me your account: detecting MMORPG game bot leveraging financial analysis with LSTM," in International Workshop on Information Security Applications, 2019, pp. 3-13.
  104. S. Priya, S. Selvakumar, and R. L. Velusamy, "Detection of phishing attacks using radial basis function network trained for categorical attributes," in 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2020, pp. 1-6.
  105. W. Yao, Y. Ding, and X. Li, "Deep learning for phishing detection," in 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), 2018, pp. 645-650.
  106. P. Yang, G. Zhao, and P. Zeng, "Phishing website detection based on multidimensional features driven by deep learning," IEEE access, vol. 7, pp. 15196-15209, 2019.
  107. S. Singh, M. Singh, and R. Pandey, "Phishing Detection from URLs Using Deep Learning Approach," in 2020 5th International Conference on Computing, Communication and Security (ICCCS), 2020, pp. 1-4.
  108. S. Sindhu, S. P. Patil, A. Sreevalsan, F. Rahman, and M. S. AN, "Phishing detection using random forest, SVM and neural network with backpropagation," in 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), 2020, pp. 391-394.
  109. I. Saha, D. Sarma, R. J. Chakma, M. N. Alam, A. Sultana, and S. Hossain, "Phishing attacks detection using deep learning approach," in 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020, pp. 1180-1185.
  110. M. A. Adebowale, K. T. Lwin, and M. A. Hossain, "Deep learning with convolutional neural network and long short-term memory for phishing detection," in 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), 2019, pp. 1-8.
  111. H. N. Digwal and N. Kavya, "Detection of Phishing Website Based on Deep Learning," International Journal of Research in Engineering, Science and Management, vol. 3, pp. 331-336, 2020.
  112. Y. Huang, J. Qin, and W. Wen, "Phishing URL Detection Via Capsule-Based Neural Network," in 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID), 2019, pp. 22-26.
  113. W. Wang, F. Zhang, X. Luo, and S. Zhang, "Pdrcnn: precise phishing detection with recurrent convolutional neural networks," Security and Communication Networks, vol. 2019, 2019.
  114. M. Chatterjee and A.-S. Namin, "Detecting phishing websites through deep reinforcement learning," in 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019, pp. 227-232.
  115. C. Opara, B. Wei, and Y. Chen, "HTMLPhish: enabling phishing web page detection by applying deep learning techniques on HTML analysis," in 2020 International Joint Conference on Neural Networks (IJCNN), 2020, pp. 1-8.
  116. Y. Huang, Q. Yang, J. Qin, and W. Wen, "Phishing URL detection via CNN and attention-based hierarchical RNN," in 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019, pp. 112-119.
  117. J. Feng, L. Zou, O. Ye, and J. Han, "Web2vec: Phishing webpage detection method based on multidimensional features driven by deep learning," IEEE Access, vol. 8, pp. 221214-221224, 2020.
  118. S. Y. Yerima and M. K. Alzaylaee, "High accuracy phishing detection based on convolutional neural networks," in 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS), 2020, pp. 1-6.
  119. A. Al-Alyan and S. Al-Ahmadi, "Robust URL phishing detection based on deep learning," KSII Transactions on Internet and Information Systems (TIIS), vol. 14, pp. 2752-2768, 2020.
  120. A. Aljofey, Q. Jiang, Q. Qu, M. Huang, and J.-P. Niyigena, "An effective phishing detection model based on character level convolutional neural network from URL," Electronics, vol. 9, p. 1514, 2020.
  121. W. Ali and A. A. Ahmed, "Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting," IET Information Security, vol. 13, pp. 659-669, 2019.
  122. M. Somesha, A. R. Pais, R. S. Rao, and V. S. Rathour, "Efficient deep learning techniques for the detection of phishing websites," Sadhana, vol. 45, pp. 1-18, 2020.
  123. O. K. Sahingoz, S. I. Baykal, and D. Bulut, "Phishing detection from urls by using neural networks," Computer Science & Information Technology (CS & IT), pp. 41-54, 2018.
  124. H. Digwal and N. Kavya, "Detection of phishing website based on deep learning," Int. J. Res. Eng. Sci. Manag, vol. 3, pp. 331-336, 2020.

Metrics

Metrics Loading ...

Most read articles by the same author(s)