Research Article | Open Access | Download Full Text
Volume 1 | Issue 1 | Year 2023 | Article Id: CYS-V1I1P104 DOI: https://doi.org/10.59232/CYS-V1I1P104
Phishing Attacks Detection Using Convolutional Dense Neural Network
R. Surendiran
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 28 May 2023 | 09 Jun 2023 | 22 Jun 2023 | 05 Jul 2023 |
Citation
R. Surendiran. “Phishing Attacks Detection Using Convolutional Dense Neural Network.” DS Journal of Cyber Security, vol. 1, no. 1, pp. 39-45, 2023.
Abstract
Keywords
Cyber security, Artificial Intelligence, Deep Learning, Convolutional Dense Neural Networks, Phishing attack detection.
References
[1] Samaneh Mahdavifar, and Ali A. Ghorbani, "Dennes: Deep Embedded Neural Network Expert System for Detecting Cyber Attacks," Neural Computing & Applications, pp. 14753–14780, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Sandhya Mishra, and Devpriya Soni, "Smishing Detector: A Security Model to Detect Smishing through SMS Content Analysis and URL Behavior Analysis," Future Generation Computer Systems, vol. 108, pp. 803-815, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Kayode Sakariyah Adewole et al., "Twitter Spam Account Detection Based on Clustering and Classification Methods," Journal of Supercomputing, vol. 76, no. 7, pp. 4802-4837, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Hang Hu, and Gang Wang, "End-to-End Measurements of Email Spoofing Attacks," USENIX Security Symposium, pp. 1095-1112, 2018.
[Google Scholar] [Publisher Link]
[5] Mirkhon Nurullaev, and Aloev Rakhmatillo Djuraevich, “Software, Algorithms and Methods of Data Encryption Based on National Standards,” IIUM Engineering Journal, vol. 21, no. 1, pp. 142-166, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Sajid Anwar et al., "Countering Malicious Urls in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4497-4504, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Tong Anh Tuan et al., "Performance Evaluation of Botnet DDos Attack Detection Using Machine Learning," Evolutionary Intelligence, vol. 13, no. 2, pp. 283-294, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Ammara Zamir et al., "Phishing Web Site Detection Using Diverse Machine Learning Algorithms," Electronic Library, vol. 38, no. 1, pp. 65-80, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Gunikhan Sonowal, and K.S. Kuppusamy, “Phidma - A Phishing Detection Model with Multi-Filter Approach,” Journal of King Saud University-Computer and Information Sciences, vol. 32, no. 1, pp. 99-112, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Nureni Ayofe Azeez et al., "Identifying Phishing Attacks in Communication Networks Using URL Consistency Features," International Journal of Electronic Security and Digital Forensics, vol. 12, no. 2, pp. 200-213, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Edwin Donald Frauenstein, and Stephen Flowerday, "Susceptibility to Phishing on Social Network Sites: A Personality Information Processing Model," Computers & Security, vol. 94, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Ahmet Selman Bozkir, and Murat Aydos, "Logosense: A Companion HOG Based Logo Detection Scheme for Phishing Web Page and Email Brand Recognition," Computers & Security, vol. 95, 2020.
[CrossRef] [Google Scholar] [Publisher Link]