Early Detection of Phishing Sites with Enhanced Neural Network Models

Isa Suarti, Totok Chamidy, Cahyo Crysdian

Abstract


Phishing is a digital crime committed with the aim of obtaining personal data by creating a link or website that resembles the original. This form of cyber attack is caused by a notification in a text message, email, or phone call. A common anti-phishing countermeasure technique is to perform early detection of potentially phishing sites, primarily according to the source code features, which are required to traverse web page content, as well as third parties that slow down the process of clarifying phishing URLs. Although the latest technology has long been used in phishing early detection, there is still a need for manual feature engineering that is important and reliable enough to detect emerging phishing offenses. One of these involves training a neural network (NN) using a dataset of known phishing URLs and legitimate URLs. The research was conducted using 200 data, Data were separated into training and testing categories.  Training was done using 100 and 120 data. Training results on 100 data and 160 data had lower iterations and errors on the tanh activation function compared to the logistic activation function. The number of iterations that occur in logistic activation is as many as 400 iterations, while when using the tanh activation function only 175 iterations are needed.

Keywords


Early Detection; Neural Network; Phishing; URL; Web Site

Full Text:

PDF

References


S. S. Roy, A. I. Awad, L. A. Amare, M. T. Erkihun, and M. Anas, “Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models,” Futur. Internet, vol. 14, no. 11, 2022, doi: 10.3390/fi14110340.

M. K. Moussavou Boussougou and D. J. Park, “Attention-Based 1D CNN-BiLSTM Hybrid Model Enhanced with FastText Word Embedding for Korean Voice Phishing Detection †,” Mathematics, vol. 11, no. 14, pp. 1–25, 2023, doi: 10.3390/math11143217.

R. Yang, K. Zheng, B. Wu, C. Wu, and X. Wang, “Phishing website detection based on deep convolutional neural network and random forest ensemble learning,” Sensors, vol. 21, no. 24, pp. 1–18, 2021, doi: 10.3390/s21248281.

D. J. Liu, G. G. Geng, X. B. Jin, and W. Wang, “An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment,” Comput. Secur., vol. 110, p. 102421, 2021, doi: 10.1016/j.cose.2021.102421.

A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil, and K. Kifayat, “A comprehensive survey of AI-enabled phishing attacks detection techniques,” Telecommun. Syst., vol. 76, no. 1, pp. 139–154, 2021, doi: 10.1007/s11235-020-00733-2.

F. E. Purwiantono and A. Tjahyanto, “Classification model based on url and content feature approach for detection phishing website in Indonesia,” J. Theor. Appl. Inf. Technol., vol. 95, no. 17, pp. 4181–4191, 2017.

E. A. Aldakheel, M. Zakariah, G. A. Gashgari, F. A. Almarshad, and A. I. A. Alzahrani, “A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators,” Sensors, vol. 23, no. 9, 2023, doi: 10.3390/s23094403.

A. Aljofey, Q. Jiang, Q. Qu, M. Huang, and J. P. Niyigena, “An effective phishing detection model based on character level convolutional neural network from URL,” Electron., vol. 9, no. 9, pp. 1–24, 2020, doi: 10.3390/electronics9091514.

Y. Kim and Y. K. Kim, “Time-Frequency Multi-Domain 1D Convolutional Neural Network with Channel-Spatial Attention for Noise-Robust Bearing Fault Diagnosis,” Sensors, vol. 23, no. 23, pp. 1–20, 2023, doi: 10.3390/s23239311.

P. Secchi, S. Vantini, and V. Vitelli, “Bagging voronoi classifiers for clustering spatial functional data,” Int. J. Appl. Earth Obs. Geoinf., vol. 22, no. 1, pp. 53–64, 2013, doi: 10.1016/j.jag.2012.03.006.

H. Salah and H. Zuhair, “Deep learning in phishing mitigation: a uniform resource locator-based predictive model,” Int. J. Electr. Comput. Eng., vol. 13, no. 3, pp. 3227–3243, 2023, doi: 10.11591/ijece.v13i3.pp3227-3243.

L. N. Smith, “Cyclical learning rates for training neural networks,” Proc. - 2017 IEEE Winter Conf. Appl. Comput. Vision, WACV 2017, no. April, pp. 464–472, 2017, doi: 10.1109/WACV.2017.58.

Y. Ida, Y. Fujiwara, and S. Iwamura, “Adaptive learning rate via covariance matrix based preconditioning for deep neural networks,” IJCAI Int. Jt. Conf. Artif. Intell., vol. 0, pp. 1923–1929, 2017, doi: 10.24963/ijcai.2017/267.

Z. Wang, S. Li, B. Wang, X. Ren, and T. Yang, “A malicious url detection model based on convolutional neural network,” Commun. Comput. Inf. Sci., vol. 1298 CCIS, pp. 34–40, 2020, doi: 10.1007/978-981-15-9031-3_3.

N. H. Hassan and A. S. Fakharudin, “Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 7, pp. 535–542, 2023, doi: 10.14569/IJACSA.2023.0140759.

E. Zhu, Y. Chen, C. Ye, X. Li, and F. Liu, “OFS-NN: An Effective Phishing Websites Detection Model Based on Optimal Feature Selection and Neural Network,” IEEE Access, vol. 7, pp. 73271–73284, 2019, doi: 10.1109/ACCESS.2019.2920655.

D. Zhang, Z. Yan, H. Jiang, and T. Kim, “A domain-feature enhanced classification model for the detection of Chinese phishing e-Business websites,” Inf. Manag., vol. 51, no. 7, pp. 845–853, 2014, doi: 10.1016/j.im.2014.08.003.

D. J. Liu, G. G. Geng, and X. C. Zhang, “Multi-scale semantic deep fusion models for phishing website detection,” Expert Syst. Appl., vol. 209, no. August, p. 118305, 2022, doi: 10.1016/j.eswa.2022.118305.

S. Ruder, “An overview of gradient descent optimization algorithms,” pp. 1–14, 2016, [Online]. Available: http://arxiv.org/abs/1609.04747

J. Wei et al., “Machine learning in materials science,” InfoMat, vol. 1, no. 3, pp. 338–358, 2019, doi: 10.1002/inf2.12028.

Y. Wang, Y. Li, Y. Song, and X. Rong, “The influence of the activation function in a convolution neural network model of facial expression recognition,” Appl. Sci., vol. 10, no. 5, 2020, doi: 10.3390/app10051897.




DOI: http://dx.doi.org/10.24014/ijaidm.v7i2.30068

Refbacks

  • There are currently no refbacks.


Office and Secretariat:

Big Data Research Centre
Puzzle Research Data Technology (Predatech)
Laboratory Building 1st Floor of Faculty of Science and Technology
UIN Sultan Syarif Kasim Riau

Jl. HR. Soebrantas KM. 18.5 No. 155 Pekanbaru Riau – 28293
Website: http://predatech.uin-suska.ac.id/ijaidm
Email: ijaidm@uin-suska.ac.id
e-Journal: http://ejournal.uin-suska.ac.id/index.php/ijaidm
Phone: 085275359942

Click Here for Information


Journal Indexing:

Google Scholar | ROAD | PKP Index | BASE | ESJI | General Impact Factor | Garuda | Moraref | One Search | Cite Factor | Crossref | WorldCat | Neliti  | SINTA | Dimensions | ICI Index Copernicus 

IJAIDM Stats