DS Journal of Cyber Security (DS-CYS)

Research Article | Open Access | Download Full Text

Volume 1 | Issue 1 | Year 2023 | Article Id: CYS-V1I1P104 DOI: https://doi.org/10.59232/CYS-V1I1P104

Phishing Attacks Detection Using Convolutional Dense Neural Network

R. Surendiran

ReceivedRevisedAcceptedPublished
28 May 202309 Jun 202322 Jun 202305 Jul 2023

Citation

R. Surendiran. “Phishing Attacks Detection Using Convolutional Dense Neural Network.” DS Journal of Cyber Security, vol. 1, no. 1, pp. 39-45, 2023.

Abstract

The term "cyber security" covers all aspects of safeguarding an existing performance, customers, and activities from internet threats. The advancing digital transformation has led to an increase in cybersecurity risks on a global scale. The possibilities for cybercriminals are made deeper by technology. Cyberattacks sometimes begin as phishing efforts to get secret user passwords. Attackers frequently employ phishing to deceive individuals into giving them access to networks and digital assets inside an organisation. Cybercriminals use security flaws to conduct attacks, gain unauthorised access, disable systems, and even charge a fee for access to be restored. The phishers use strategies to get beyond anti-phishing software and tools. Cybersecurity is still the best method for preventing phishing efforts, even though threat intelligence and perception solutions aid enterprises in identifying unusual traffic patterns. In light of this, the suggested Phishing attack detection (PAD) research project has developed an approach that uses convolutional dense neural networks to identify phishing threats (CDNNs). Initially, the data are pre-processed using a data mining technique to remove the noise from the data. Based on pre-processed data, CDNN is utilised to categorise the attacks. Finally, a maximum accuracy of suggested (PAD) of 97% was accomplished using existing random approaches.

Keywords

Cyber security, Artificial Intelligence, Deep Learning, Convolutional Dense Neural Networks, Phishing attack detection.

References

[1] Samaneh Mahdavifar, and Ali A. Ghorbani, "Dennes: Deep Embedded Neural Network Expert System for Detecting Cyber Attacks," Neural Computing & Applications, pp. 14753–14780, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[2] Sandhya Mishra, and Devpriya Soni, "Smishing Detector: A Security Model to Detect Smishing through SMS Content Analysis and URL Behavior Analysis," Future Generation Computer Systems, vol. 108, pp. 803-815, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[3] Kayode Sakariyah Adewole et al., "Twitter Spam Account Detection Based on Clustering and Classification Methods," Journal of Supercomputing, vol. 76, no. 7, pp. 4802-4837, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[4] Hang Hu, and Gang Wang, "End-to-End Measurements of Email Spoofing Attacks," USENIX Security Symposium, pp. 1095-1112, 2018.

[Google Scholar] [Publisher Link]

[5] Mirkhon Nurullaev, and Aloev Rakhmatillo Djuraevich, “Software, Algorithms and Methods of Data Encryption Based on National Standards,” IIUM Engineering Journal, vol. 21, no. 1, pp. 142-166, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[6] Sajid Anwar et al., "Countering Malicious Urls in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4497-4504, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[7] Tong Anh Tuan et al., "Performance Evaluation of Botnet DDos Attack Detection Using Machine Learning," Evolutionary Intelligence, vol. 13, no. 2, pp. 283-294, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[8] Ammara Zamir et al., "Phishing Web Site Detection Using Diverse Machine Learning Algorithms," Electronic Library, vol. 38, no. 1, pp. 65-80, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[9] Gunikhan Sonowal, and K.S. Kuppusamy, “Phidma - A Phishing Detection Model with Multi-Filter Approach,” Journal of King Saud University-Computer and Information Sciences, vol. 32, no. 1, pp. 99-112, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[10] Nureni Ayofe Azeez et al., "Identifying Phishing Attacks in Communication Networks Using URL Consistency Features," International Journal of Electronic Security and Digital Forensics, vol. 12, no. 2, pp. 200-213, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[11] Edwin Donald Frauenstein, and Stephen Flowerday, "Susceptibility to Phishing on Social Network Sites: A Personality Information Processing Model," Computers & Security, vol. 94, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[12] Ahmet Selman Bozkir, and Murat Aydos, "Logosense: A Companion HOG Based Logo Detection Scheme for Phishing Web Page and Email Brand Recognition," Computers & Security, vol. 95, 2020.

[CrossRef] [Google Scholar] [Publisher Link]    

Phishing Attacks Detection Using Convolutional Dense Neural Network