Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
Subject Areas : information technologyreza assareh 1 , younes mobasheri 2
1 - Assistant Professor, Department of Computer Engineering, Yadgar Imam Khomeini Unit, Shahr Ray, Islamic Azad University, Shahr Ray, Iran.
2 -
Keywords: cyber attacks, phishing attacks, machine learning, multilayer perceptron neural network, ali baba and the forty thieves ,
Abstract :
One of the cyber attacks is phishing attacks, which have increased rapidly in recent years. Defining robust, efficient and up-to-date methods for phishing detection is essential. Using machine learning to train a system that recognizes phishing messages is essential to increase the level of security against cyber attacks. By finding the weights and biases of the neural network through the algorithm of ali baba and the forty thieves, it is possible to identify phishing pages with high accuracy. Multi-layer perceptron neural network is used in the proposed method to classify and detect phishing attacks. The weights of the multi-layer perceptron neural network are found through the algorithm of ali baba and the forty thieves. The important thing is to choose the method with which the cost function is calculated, which includes 'mse', 'rmse' and 'accuracy'. The simulation of the proposed method has been done through matlab software. In the dataset, different features related to legal and phishing websites have been identified and 1353 different websites have been collected from different sources. The results of the proposed method are compared with the basic design in terms of precision, accuracy, F1_Score and AUC-ROC curve. According to the obtained results, the accuracy of the proposed method is 4.91% compared to the LR method, 5.7% compared to the support vector machine method, 3.72% compared to the K-nearest neighbor method, and 9.03% compared to the adaboost method. Compared to the multilayer perceptron method, it has improved by 3.53%, compared to the J48 method by 2.46%, and compared to the random forest method by 0.74%. Also, the proposed method has improved compared to the combined methods of meta-heuristic algorithms and neural network. The accuracy of the proposed method has improved by 1.3% compared to the EPO-ANN method and by 1.41% compared to the SSA-ANN method.
[1] Sabahno, M., & Safara, F. (2022). ISHO: improved spotted hyena optimization algorithm for phishing website detection. Multimedia Tools and Applications, 81(24), 34677-34696.
[2] Minocha, S., & Singh, B. (2022). A novel phishing detection system using binary modified equilibrium optimizer for feature selection. Computers & Electrical Engineering, 98, 107689.
[3] Das, S., Nippert-Eng, C., & Camp, L. J. (2022). Evaluating user susceptibility to phishing attacks. Information & Computer Security.
[4] Jain, A. K., & Gupta, B. B. (2022). A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Information Systems, 16(4), 527-565.
[5] Barreiro Herrera, D. A., & Camargo Mendoza, J. E. (2022). A Systematic Review on Phishing Detection: A Perspective Beyond a High Accuracy in Phishing Detection. In International Conference on Applied Informatics (pp. 173-188). Springer, Cham.
[6] Jafar, M. T., Al-Fawa’reh, M., Barhoush, M., & Alshira’H, M. H. (2022). Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis. Cybernetics and Information Technologies, 22(1), 60-76.
[7] Almseidin, M., Alkasassbeh, M., Alzubi, M., & Al-Sawwa, J. (2022). Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation. Cryptography, 6(2), 24.
[8] Kovač, A., Dunđer, I., & Seljan, S. (2022). An overview of machine learning algorithms for detecting phishing attacks on electronic messaging services. In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) (pp. 954-961). IEEE.
[9] Zhu, E., Yuan, Q., Chen, Z., Li, X., & Fang, X. (2022). CCBLA: a Lightweight Phishing Detection Model Based on CNN, BiLSTM, and Attention Mechanism. Cognitive Computation, 1-14.
[10] Altaher, A. (2017). Phishing websites classification using hybrid SVM and KNN approach. International Journal of Advanced Computer Science and Applications, 8(6).
[11] Braik, M., Ryalat, M. H., & Al-Zoubi, H. (2022). A novel meta-heuristic algorithm for solving numerical optimization problems: Ali Baba and the forty thieves. Neural Computing and Applications, 34(1), 409-455.
[12] Lastdrager, E. E. (2014). Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Science, 3(1), 1-10.
[13] Mohammad, R. M., Thabtah, F., & McCluskey, L. (2015). Tutorial and critical analysis of phishing websites methods. Computer Science Review, 17, 1-24.
[14] Garera, S., Provos, N., Chew, M., & Rubin, A. D. (2007). A framework for detection and measurement of phishing attacks. In Proceedings of the 2007 ACM workshop on Recurring malcode (pp. 1-8).
[15] Khonji, M., Iraqi, Y., & Jones, A. (2013). Phishing detection: a literature survey. IEEE Communications Surveys & Tutorials, 15(4), 2091-2121.
[16] Pandove, K., Jindal, A., & Kumar, R. (2010). Email spoofing. International Journal of Computer Applications, 5(1), 27-30.
[17] Varshney, G., Sardana, A., & Joshi, R. C. (2012). Secret information display based authentication technique towards preventing phishing attacks. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (pp. 602-608).
[18] Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74-81.
[19] Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine learning based phishing detection from URLs. Expert Systems with Applications, 117, 345-357.
[20] Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.
[21] Luo, Z. (2013). A study of accuracy and reliability of CBIR-based phishing filter (Doctoral dissertation, Purdue University).
[22] Drake, C. E., Oliver, J. J., & Koontz, E. J. (2004). Anatomy of a Phishing Email. In CEAS.
[23] Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013). A survey of phishing email filtering techniques. IEEE communications surveys & tutorials, 15(4), 2070-2090.
[24] Varshney, G., Joshi, R. C., & Sardana, A. (2012). Personal secret information based authentication towards preventing phishing attacks. In Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India-Volume 1 (pp. 31-42). Springer Berlin Heidelberg.
[25] Gupta, S., & Kumar, P. (2013). A desktop notification based scheme for preventing online frauds attempts to cloud users S| pp| S. In 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 255-260). IEEE.
[26] Workman, M. (2008). Wisecrackers: A theory‐grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American society for information science and technology, 59(4), 662-674.
[27] Varshney, G., Misra, M., & Atrey, P. K. (2016). A survey and classification of web phishing detection schemes. Security and Communication Networks, 9(18), 6266-6284.
[28] Kim, H., & Huh, J. H. (2011). Detecting DNS-poisoning-based phishing attacks from their network performance characteristics. Electronics Letters, 47(11), 656-658.
[29] Magdalin, V. (2015). U.S. Patent No. 8,990,933. Washington, DC: U.S. Patent and Trademark Office.
[30] Bradley, T. (2011). Epsilon Data Breach: Expect a Surge in Spear Phishing Attacks. PCWorld, April.
[31] Unlu, S. A., & Bicakci, K. (2010). Notabnab: Protection against the “tabnabbing attack”. In 2010 eCrime Researchers Summit (pp. 1-5). IEEE.
[32] Dhamija, R., & Tygar, J. D. (2005). The battle against phishing: Dynamic security skins. In Proceedings of the 2005 symposium on Usable privacy and security (pp. 77-88).
[33] Bergholz, A., De Beer, J., Glahn, S., Moens, M. F., Paaß, G., & Strobel, S. (2010). New filtering approaches for phishing email. Journal of computer security, 18(1), 7-35.
[34] Islam, R., & Abawajy, J. (2013). A multi-tier phishing detection and filtering approach. Journal of Network and Computer Applications, 36(1), 324-335.
[35] Korkmaz, M., Sahingoz, O. K., & Diri, B. (2020). Feature selections for the classification of webpages to detect phishing attacks: a survey. In 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1-9). IEEE.
[36] Moghimi, M., & Varjani, A. Y. (2016). New rule-based phishing detection method. Expert systems with applications, 53, 231-242.
[37] Singh, P., Maravi, Y. P., & Sharma, S. (2015). Phishing websites detection through supervised learning networks. In 2015 international conference on computing and communications technologies (ICCCT) (pp. 61-65). IEEE.
[38] Mohammad, R. M., Thabtah, F., & McCluskey, L. (2014). Predicting phishing websites based on self-structuring neural network. Neural Computing and Applications, 25, 443-458.
[39] Mohammad, R., McCluskey, T. L., & Thabtah, F. (2013). Predicting phishing websites using neural network trained with back-propagation. World Congress in Computer Science, Computer Engineering, and Applied Computing.
[40] Nguyen, L. A. T., To, B. L., Nguyen, H. K., & Nguyen, M. H. (2014). A novel approach for phishing detection using URL-based heuristic. In 2014 international conference on computing, management and telecommunications (ComManTel) (pp. 298-303). IEEE.
[41] Abdelhamid, N., Ayesh, A., & Thabtah, F. (2014). Phishing detection based associative classification data mining. Expert Systems with Applications, 41(13), 5948-5959.
[42] Abdelhamid, N. (2015). Multi-label rules for phishing classification. Applied Computing and Informatics, 11(1), 29-46.
[43] Mohammad, R. M., Thabtah, F., & McCluskey, L. (2014). Intelligent rule‐based phishing websites classification. IET Information Security, 8(3), 153-160.
[44] Kausar, F., Al-Otaibi, B., & Al-Qadi, A. (2015). Hybrid client side phishing websites detection approach. Advanced Engineering Technology and Application, 4(2), 1-9.
[45] Nguyen, L. A. T., To, B. L., Nguyen, H. K., & Nguyen, M. H. (2013). Detecting phishing web sites: A heuristic URL-based approach. In 2013 International Conference on Advanced Technologies for Communications (ATC 2013) (pp. 597-602). IEEE.
[46] Gu, X., Wang, H., & Ni, T. (2013). An efficient approach to detecting phishing web. Journal of Computational Information Systems, 9(14), 5553-5560.
[47] Barraclough, P. A., Hossain, M. A., Tahir, M. A., Sexton, G., & Aslam, N. (2013). Intelligent phishing detection and protection scheme for online transactions. Expert Systems with Applications, 40(11), 4697-4706.
[48] Xu, L., Zhan, Z., Xu, S., & Ye, K. (2013). Cross-layer detection of malicious websites. In Proceedings of the third ACM conference on Data and application security and privacy (pp. 141-152).
[49] Eshete, B. (2013). Effective analysis, characterization, and detection of malicious web pages. In Proceedings of the 22nd International Conference on World Wide Web (pp. 355-360).
[50] Shahriar, H., & Zulkernine, M. (2012). Trustworthiness testing of phishing websites: A behavior model-based approach. Future Generation Computer Systems, 28(8), 1258-1271.
[51] Zhuang, W., Jiang, Q., & Xiong, T. (2012). An intelligent anti-phishing strategy model for phishing website detection. In 2012 32nd International Conference on Distributed Computing Systems Workshops (pp. 51-56). IEEE.
[52] Xiang, G., Hong, J., Rose, C. P., & Cranor, L. (2011). Cantina+ a feature-rich machine learning framework for detecting phishing web sites. ACM Transactions on Information and System Security (TISSEC), 14(2), 1-28.
[53] He, M., Horng, S. J., Fan, P., Khan, M. K., Run, R. S., Lai, J. L.,... & Sutanto, A. (2011). An efficient phishing webpage detector. Expert systems with applications, 38(10), 12018-12027.
[54] Aburrous, M., Hossain, M. A., Dahal, K., & Thabtah, F. (2010). Intelligent phishing detection system for e-banking using fuzzy data mining. Expert systems with applications, 37(12), 7913-7921.
[55] Ma, J., Saul, L. K., Savage, S., & Voelker, G. M. (2009). Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1245-1254).
[56] Uplenchwar, S., Sawant, V., Surve, P., Deshpande, S., & Kelkar, S. (2022). Phishing Attack Detection on Text Messages Using Machine Learning Techniques. In 2022 IEEE Pune Section International Conference (PuneCon) (pp. 1-5). IEEE.
[57] Palša, J., Ádám, N., Hurtuk, J., Chovancová, E., Madoš, B., Chovanec, M., & Kocan, S. (2022). MLMD—A Malware-Detecting Antivirus Tool Based on the XGBoost Machine Learning Algorithm. Applied Sciences, 12(13), 6672.
[58] Bhagwat, S., & Gupta, G. P. (2022). Android Malware Detection Using Hybrid Meta-heuristic Feature Selection and Ensemble Learning Techniques. In International Conference on Advances in Computing and Data Sciences (pp. 145-156). Springer, Cham.
[59] Alzubi, O. A., Alzubi, J. A., Al-Zoubi, A. M., Hassonah, M. A., & Kose, U. (2022). An efficient malware detection approach with feature weighting based on Harris Hawks optimization. Cluster Computing, 25(4), 2369-2387.
[60] Al-Andoli, M. N., Tan, S. C., Sim, K. S., Lim, C. P., & Goh, P. Y. (2022). Parallel Deep Learning with a hybrid BP-PSO framework for feature extraction and malware classification. Applied Soft Computing, 131, 109756.
[61] Dhiyanesh, B., Selvanathan, N., Kiruthiga, G., & Radha, R. (2021). Effective attribute selection and classification technique for phishing attacks detection. In 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 1-7). IEEE.
[62] Ripa, S. P., Islam, F., & Arifuzzaman, M. (2021). The emergence threat of phishing attack and the detection techniques using machine learning models. In 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0 (ACMI) (pp. 1-6). IEEE.
[63] Stobbs, J., Issac, B., & Jacob, S. M. (2020). Phishing web page detection using optimised machine learning. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 483-490). IEEE.
[64] Abedin, N. F., Bawm, R., Sarwar, T., Saifuddin, M., Rahman, M. A., & Hossain, S. (2020). Phishing attack detection using machine learning classification techniques. In 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS) (pp. 1125-1130). IEEE.
[65] Zhang, X., Shi, D., Zhang, H., Liu, W., & Li, R. (2018). Efficient detection of phishing attacks with hybrid neural networks. In 2018 IEEE 18th International Conference on Communication Technology (ICCT) (pp. 844-848). IEEE.
[66] Darshan, S. S., Kumara, M. A., & Jaidhar, C. D. (2016). Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm. In 2016 11th International Conference on Industrial and Information Systems (ICIIS) (pp. 534-539). IEEE.
[67] Jalil, S., Usman, M., & Fong, A. (2022). Highly accurate phishing URL detection based on machine learning. Journal of Ambient Intelligence and Humanized Computing, 1-19.
[68] Vijay, J. S., Kulkarni, K., & Arya, A. (2022). Metaheuristic Optimization of Neural Networks for Phishing Detection. In 2022 3rd International Conference for Emerging Technology (INCET) (pp. 1-5). IEEE.