Advancements in Phishing Detection: Automated Systems in Real-World Scenarios

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : August 12, 2024 at 4:18 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 02 | Page : 12-17

n

n

n

n

n

n

By

n

[foreach 286]n

n

n

S. Umamaheswari, S. Saranya,

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Professor, Professor Department of Information Technology, C. Abdul Hakeem College of Engineering and Technology/Anna University, Department of Information Technology, C. Abdul Hakeem College of Engineering and Technology/Anna University Tamil Nadu, Tamil Nadu India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nThe goal of the abstract is to offer an automated method that uses login URLs to identify real-world scenarios. Phishing is a type of cyberattack that involves social engineering, when malefactors trick victims into providing their login credentials via a login form that sends the information to a hostile site. In this research, we offer a system that uses URL analysis to detect phishing websites by comparing machine learning and deep learning methodologies. The legitimate class in the majority of modern state-of-the-art phishing detection technologies consists of homepages without login fields. Instead, we utilize the login page URL in both classes, since we believe it to be a lot more realistic case scenario, and we show that testing with legitimate login page URLs yields a significant false-positive rate for existing methodologies. Additionally, we train a base model with old datasets and test it with new URLs, using datasets from different years to illustrate how models lose accuracy with time. Additionally, we run a frequency analysis across active phishing domains to find various tactics used by phishers in their campaigns. In order to validate these claims, we have developed a new dataset called Phishing Index Login URL (PILU-90K), which consists of 30K phishing URLs and 60K authentic URLs, such as index and login webpages.

n

n

n

Keywords: Phishing index, Frequency, traffic, PyCharm, python libraries, naïve bayes

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Telecommunication, Switching Systems and Networks(jotssn)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Telecommunication, Switching Systems and Networks(jotssn)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: S. Umamaheswari, S. Saranya. Advancements in Phishing Detection: Automated Systems in Real-World Scenarios. Journal of Telecommunication, Switching Systems and Networks. July 23, 2024; 11(02):12-17.

n

How to cite this URL: S. Umamaheswari, S. Saranya. Advancements in Phishing Detection: Automated Systems in Real-World Scenarios. Journal of Telecommunication, Switching Systems and Networks. July 23, 2024; 11(02):12-17. Available from: https://journals.stmjournals.com/jotssn/article=July 23, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n

n[if 992 not_equal=’Open Access’] [/if 992]nn

n

nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Maddireddy BR, Maddireddy BR. AI-Based Phishing Detection Techniques: A Comparative Analysis of Model Performance. Unique Endeavor in Business & Social Sciences. 2022 Jun 30;1(2):63-77.
  2. Alkhalil Z, Hewage C, Nawaf L, Khan I. Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science. 2021 Mar 9;3:563060.
  3. Alzahrani A. Coronavirus social engineering attacks: Issues and recommendations. International Journal of Advanced Computer Science and Applications. 2020;11(5).
  4. Pandey N, Pal A. Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice. International journal of information management. 2020 Dec 1;55:102171.
  5. Patel P, Sarno DM, Lewis JE, Shoss M, Neider MB, Bohil CJ. Perceptual representation of spam and phishing emails. Applied cognitive psychology. 2019 Nov;33(6):1296-304.
  6. Chaudhry JA, Chaudhry SA, Rittenhouse RG. Phishing attacks and defenses. International journal of security and its applications. 2016 Jan 1;10(1):247-56.
  7. Hijji M, Alam G. A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions. Ieee Access. 2021 Jan 1;9:7152-69.
  8. Sahingoz OK, Buber E, Demir O, Diri B. Machine learning based phishing detection from URLs. Expert Systems with Applications. 2019 Mar 1;117:345-57.
  9. Rao RS, Pais AR. Jail-Phish: An improved search engine based phishing detection system. Computers & Security. 2019 Jun 1;83:246-67.
  10. Ramanathan V, Wechsler H. phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training. EURASIP Journal on Information Security. 2012 Dec;2012:1-22.
  11. Jakobsson M, Myers S, editors. Phishing and countermeasures: understanding the increasing problem of electronic identity theft. John Wiley & Sons; 2006 Dec 5.
  12. Zhang W, Gupta S, Lian X, Liu J. Staleness-aware async-sgd for distributed deep learning. arXiv preprint arXiv:1511.05950. 2015 Nov 18.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 02
Received July 6, 2024
Accepted July 10, 2024
Published July 23, 2024

n

n

n

n

n

n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.