Skip to main content

Catching a Phish: Frontiers of Deep Learning-Based Anticipating Detection Engines

  • Conference paper
  • First Online:
Advances on Intelligent Informatics and Computing (IRICT 2021)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 127))

  • 887 Accesses

Abstract

In recent years, cyber-security gains high attention in the light of ethical hacking and social engineering attacks like phishing that riskily overshadow the development of social networking, e commerce, and information technology. Thus, mitigation of such risks via AI techniques represents the prime research direction in academia and industry. Amongst, are the detection engines integrating diverse deep learning algorithms to anticipate changeable phishing features over time into the classification models. However, extracting the mutual features and predicting the future changes in phishing attacks still need more concrete characterization and accurate classification with fewer faults in the online engine. Upon these needs, this paper aims to present future-oriented standpoints for long-term, hybrid, cognitive, and effective phishing detection about the existing deep learning-based classification models by appraising the prior research and compiling their outstanding problems. This aim is achieved through a comparative and critical review of the prior research and then discuss the possible solutions for future phishing detection approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Somesha, M., Pais, A.R., Rao, R.S., Rathour, V.S.: Efficient deep learning techniques for the detection of phishing websites. Sādhanā 45(1), 1–18 (2020). https://doi.org/10.1007/s12046-020-01392-4

    Article  Google Scholar 

  2. Zuhair, H., Selamat, A.: Phish webpage classification using hybrid algorithm of machine learning and statistical induction ratios. Int. J. Data Min. Model. Manag. 12(3), 255–276 (2020)

    Google Scholar 

  3. Zuhair, H., Selamat, A.: Phishing classification models: issues and perspectives. Int. J. Digit. Enterpr. Technol. 1(3), 219–240 (2019). https://doi.org/10.1504/ijdet.2019.10019065

    Article  Google Scholar 

  4. Tang, L., Mahmoud, Q.H.: A Survey of machine learning-based solutions for phishing website detection. Mach. Learn. Knowl. Extr. 3, 672–694 (2021). https://doi.org/10.3390/make3030034

    Article  Google Scholar 

  5. Routhu Srinivasa Rao, A.R.P.: Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput. Appl. 31(8), 3851–3873 (2018)

    Google Scholar 

  6. Bai, W.: Phishing website detection based on machine learning algorithm. In: Proceedings - 2020 International Conference Computing Data Science CDS 2020, pp. 293–298 (2020). https://doi.org/10.1109/CDS49703.2020.00064

  7. Josh Patterson, A.G.: Deep Learning. O’Reilly Media, Inc. (2017)

    Google Scholar 

  8. Abbasi, M., Shahraki, A., Taherkordi, A.: Deep learning for network traffic monitoring and analysis (NTMA): a survey. Comput. Commun. 170, 19–41 (2021). https://doi.org/10.1016/j.comcom.2021.01.021

    Article  Google Scholar 

  9. Mosca, P., Zhang, Y., Xiao, Z., Y.W.: Cloud security: services, risks, and a case study on amazon cloud services. Int’l J. Commun. Netw. Syst. Sci. 7(12), 529 (2014)

    Google Scholar 

  10. Aldweesh, A., Derhab, A., Emam, A.Z.: Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowledge-Based Syst. 189, 105124 (2020). https://doi.org/10.1016/j.knosys.2019.105124.

  11. Berman, D.S., Buczak, A.L., Chavis, J.S., Corbett, C.L.: A survey of deep learning methods for cyber security. Inf. 10(4), 122 (2019). https://doi.org/10.3390/info10040122

  12. O’Shea, K., Nash, R.: An Introduction to Convolutional Neural Networks. (2015)

    Google Scholar 

  13. Yuan, X., Li, L., Wang, Y.: Nonlinear dynamic soft sensor modeling with supervised long short-term memory network. IEEE Trans. Ind. Inform. 16, 3168–3176 (2020). https://doi.org/10.1109/TII.2019.2902129

    Article  Google Scholar 

  14. ALEXA Homepage. https://www.alexa.com/topsites. Accessed 21 Oct 2021

  15. Commoncrawl Homepage. http://index.commoncrawl.org/. Accessed 21 Oct 2021

  16. Vrbančič, G.: Phishing Websites Dataset. https://doi.org/10.17632/72ptz43s9v.1. Accessed 13 Nov 2021

  17. Phish Tank Homepage. https://www.phishtank.com/. Accessed 21 Oct 2021

  18. Openphish Homepage. https://openphish.com/. Accessed 21 Oct 2021

  19. UCI Machine learning repository. https://archive.ics.uci.edu/ml/datasets/phishing+websites. Accessed 21 Oct 2021

  20. Github Homepage. https://github.com/ebubekirbbr/pdd/tree/master/input. Accessed 21 Oct 2021

  21. Kaggle Homepage. https://www.kaggle.com/datasets. Accessed 21 Oct 2021

  22. 5000best Homepage. http://5000best.com/websites/. Accessed 21 Oct 2021

  23. Pavan Kumar, P., Jaya, T., Rajendran, V.: SI-BBA – a novel phishing website detection based on Swarm intelligence with deep learning. Mater. Today Proc. (2021). https://doi.org/10.1016/j.matpr.2021.07.178

    Article  Google Scholar 

  24. Xiao, X., et al.: Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets. Comput. Secur. 108, 102372 (2021). https://doi.org/10.1016/j.cose.2021.102372.

  25. Jiang, J., et al.: A deep learning based online malicious URL and DNS detection scheme. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICSSITE, vol. 238, pp. 438–448. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78813-5_22

    Chapter  Google Scholar 

  26. Ozcan, A., Catal, C., Donmez, E., Senturk, B.: A hybrid DNN–LSTM model for detecting phishing URLs. Neural Comput. Appl. 0123456789 (2021). https://doi.org/10.1007/s00521-021-06401-z.

  27. Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K. (eds.): SpaCCS 2017. LNCS, vol. 10658. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72395-2

    Book  Google Scholar 

  28. Huang, Y., Yang, Q., Qin, J., Wen, W.: Phishing URL detection via CNN and attention-based hierarchical RNN. In: Proceedings - 2019 18th IEEE International Conference Trust Security Private Computing Communication IEEE International Confrence Big Data Science Engineering Trust 2019. 112–119 (2019). https://doi.org/10.1109/TrustCom/BigDataSE.2019.00024

  29. Yang, P., Zhao, G., Zeng, P.: Phishing website detection based on multidimensional features driven by deep learning. IEEE Access. 7, 15196–15209 (2019). https://doi.org/10.1109/ACCESS.2019.2892066

    Article  Google Scholar 

  30. Yerima, S.Y., Alzaylaee, M.K.: High accuracy phishing detection based on convolutional neural networks. In: ICCAIS 2020 - 3rd International Conference Computing Application Information Security, pp. 19–21 (2020). https://doi.org/10.1109/ICCAIS48893.2020.9096869

  31. Su, Y.: Research on website phishing detection based on LSTM RNN. In: Proceedings 2020 IEEE 4th Information Technology Networking, Electronic Automation Control Conference ITNEC 2020, pp. 284–288 (2020). https://doi.org/10.1109/ITNEC48623.2020.9084799

  32. Yazhmozhi, V.M., Janet, B., Reddy, S.: Anti-phishing system using LSTM and CNN. In: 2020 IEEE International Conference for Innovation in Technology INOCON 2020, pp. 1–5 (2020). https://doi.org/10.1109/INOCON50539.2020.9298298

  33. Singh, S., Singh, M.P., Pandey, R.: Phishing detection from URLs using deep learning approach. In: Proceedings of 2020 International Conference on Computing, Communication and Security ICCCS 2020, pp. 16–19 (2020). https://doi.org/10.1109/ICCCS49678.2020.9277459

  34. Rasymas, T., Dovydaitis, L.: Detection of phishing URLs by using deep learning approach and multiple features combinations. Balt. J. Mod. Comput. 8, 471–483 (2020). https://doi.org/10.22364/BJMC.2020.8.3.06

  35. Wei, W., Ke, Q., Nowak, J., Korytkowski, M., Scherer, R., Woźniak, M.: Accurate and fast URL phishing detector: a convolutional neural network approach. Comput. Netw. 178 (2020). https://doi.org/10.1016/j.comnet.2020.107275

  36. Zhang, X., Shi, D., Zhang, H., Liu, W., Li, R.: Efficient detection of phishing attacks with hybrid neural networks. In: International Conference on Communication Technology Proceedings, ICCT. 2019-October, pp. 844–848 (2019). https://doi.org/10.1109/ICCT.2018.8600018

  37. Lakshmi, L., Reddy, M.P., Santhaiah, C., Reddy, U.J.: Smart phishing detection in web pages using supervised deep learning classification and optimization technique ADAM. Wirel. Pers. Commun. 118(4), 3549–3564 (2021). https://doi.org/10.1007/s11277-021-08196-7

    Article  Google Scholar 

  38. Al-Ahmadi, S., Alharbi, Y.: A deep learning technique for web phishing detection combined Url features and visual similarity. Int. J. Comput. Networks Commun. 12, 41–54 (2020). https://doi.org/10.5121/ijcnc.2020.12503

    Article  Google Scholar 

  39. Ali, W., Ahmed, A.A.: Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. IET Inf. Secur. 13, 659–669 (2019). https://doi.org/10.1049/iet-ifs.2019.0006

    Article  Google Scholar 

  40. Yao, W., Ding, Y., Li, X.: Deep learning for phishing detection. In: Proceedings - 16th IEEE International Symposium Parallel Distribution Processing with Application 17th IEEE International Conference Ubiquitous Computing Communication 8th IEEE International Conference Big Data Cloud Computing, vol. 11t, pp. 645–650 (2019). https://doi.org/10.1109/BDCloud.2018.00099

  41. Chen, W., Zhang, W., Su, Y.: Phishing detection research based on LSTM recurrent neural network. In: Zhou, Q., Gan, Y., Jing, W., Song, X., Wang, Y., Lu, Z. (eds.) ICPCSEE 2018. CCIS, vol. 901, pp. 638–645. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-2203-7_52

    Chapter  Google Scholar 

  42. Opara, C., Wei, B., Chen, Y.: HTMLPhish: enabling phishing web page detection by applying deep learning techniques on HTML analysis. In: Proceedings of International Joint Conference Neural Networks, pp. 1–8 (2020). https://doi.org/10.1109/IJCNN48605.2020.9207707

  43. Hema, R., Ramya, V., Sahithya, K., Sekharan, R.: Detecting of phishing websites using deep learning. J. Crit. Rev. 7, 3606–3613 (2020)

    Google Scholar 

  44. Feng, J., Zou, L., Nan, T.: A phishing webpage detection method based on stacked autoencoder and correlation coefficients. J. Comput. Inf. Technol. 27, 41–54 (2019). https://doi.org/10.20532/cit.2019.1004702

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiba Zuhair .

Editor information

Editors and Affiliations

Appendix

Appendix

Table A1. Comparative performance outcomes of the revisited related works

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Salah, H., Zuhair, H. (2022). Catching a Phish: Frontiers of Deep Learning-Based Anticipating Detection Engines. In: Saeed, F., Mohammed, F., Ghaleb, F. (eds) Advances on Intelligent Informatics and Computing. IRICT 2021. Lecture Notes on Data Engineering and Communications Technologies, vol 127. Springer, Cham. https://doi.org/10.1007/978-3-030-98741-1_40

Download citation

Publish with us

Policies and ethics