Abstract
Phishing attack is one of wide spread cybercrimes due to the advancement of the Internet. There are many forms of phishing attack and the most common one is through email. The attacker tries to pretend by sending email from an official organization or body to deceive the user in giving in their credential user name and password. The username and password are then used for malicious purpose. Many methods have been used to detect these phishing attacks; however, the attack evolved too quickly to be solved by manual approach. Therefore, automated phishing detection through artificial intelligence approach would be more feasible. In this paper, a comparison study for phishing detection between two neural networks which are the feedforward neural network and the deep learning neural network is carried out. The result is empirically evaluated to determine which method performs better in phishing detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Vayansky, I., Kumar, S.L.: Phishing–challenges and solutions. Computer Fraud & Security (1), 15-20 (2018).
Gupta, B. B., Tewari, A., Jain, A. K., Agrawal, D. P.: Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications 28(12), 3629-3654 (2017).
Gupta, B. B., Arachchilage, N. A., Psannis, K. E.: Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommunication Systems 67(2), 247-267 (2018).
Chin, K. O., Chang, K. T., Teo, J., Alfred, R., Cheng, W., Tan, T. G.: Self-Evaluation of RTS Troop’s Performance. Journal Teknologi. UTM Press. 76(12), 119–126 (2015).
Tan, T. G., Yong, Y. N., Chin, K. O., Teo, J., Alfred, R.: Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm. CCIS 378, Springer-Verlag Berlin Heidelberg, 135–146 (2013).
Ian, K. W., Chin, K. O., Alfred, R., Asri A. A. A., Tan, T. G., Anthony, P.: A Review of Computer Vision Methods for Fruit Recognition. Advanced Science Letters 24(2), 1538-1542 (2018).
Connie, L., Chin, K. O., Anthony, P.: A Review of Automatic License Plate Recognition System in Mobile based Platform. Journal of Telecommunication, Electronic and Computer Engineering 10(3-2), 77-82 (2018).
Chin, K. O., Teo, K. Y., Alfred, R., Teo, J., Anthony, P., Cheng, W.: Backpropagation Neural Ensemble for Localizing and Recognizing Non-Standardized Malaysia’s Car Plates. International Journal on Advanced Science, Engineering and Information Technology 6 (2016).
Chang, S. V., Chin, K. O., Gan, K. S., Alfred, R., Anthony, P.: External Constraints of Neural Cognition for CIMB Stock Closing Price Prediction. UPM Press (2017).
Phang, W. S., Tan, L. I., Anthony, P., Chin, K. O.: Improving the Accuracy of Stock Price Prediction Using Ensemble Neural Network 24(2), 1524-1527 (2018).
Gupta, N.: Artificial neural network. Network and Complex Systems 3(1), 24-28 (2013).
Chang, S. V., Gan, K. S., Chin, K. O., Alfred, R., Anthony, P.: A review of stock market prediction with Artificial neural network (ANN). In 2013 IEEE International Conference on Control System, Computing and Engineering, pp. 477-482. IEEE (2013).
Teraguchi, N. C. R. L. Y., Mitchell, J. C.: Client-side defense against web-based identity theft. Computer Science Department, Stanford University (2004).
Prakash, P., Kumar, M., Kompella, R. R., Gupta, M.: Phishnet: predictive blacklisting to detect phishing attacks. In 2010 Proceedings IEEE INFOCOM, pp. 1-5. IEEE (2010).
Fu, A. Y., Wenyin, L., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE transactions on dependable and secure computing 3(4), 301-311 (2006).
Mao, J., Li, P., Li, K., Wei, T., Liang, Z.: BaitAlarm: detecting phishing sites using similarity in fundamental visual features. In 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 790-795. IEEE (2013).
Chandrasekaran, M., Narayanan, K., & Upadhyaya, S.: Phishing email detection based on structural properties. In NYS cyber security conference (Vol. 3). (2006).
Sanchez, F., Duan, Z.: A sender-centric approach to detecting phishing emails. In 2012 International Conference on Cyber Security, pp. 32-39. IEEE (2012).
Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, pp. 60-69. ACM (2007).
Mohammad, R., McCluskey, T. L., Thabtah, F. A.: Predicting phishing websites using neural network trained with back-propagation. World Congress in Computer Science, Computer Engineering, and Applied Computing. (2013).
Zhang, N., Yuan, Y.: Phishing detection using neural network. Department of Computer Science, Department of Statistics, Stanford University. CA (2013).
Jameel, N. G. M., George, L. E.: Detection of phishing emails using feed forward neural network. International Journal of Computer Applications 77(7). (2013).
Hansen, L. K., Salamon, P.: Neural network ensembles. IEEE Transactions on Pattern Analysis & Machine Intelligence, (10), 993-1001 (1990).
Acknowledgement
This project is partially supported by university SBK0366-2017 research grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Soon, G.K., Chiang, L.C., On, C.K., Rusli, N.M., Fun, T.S. (2020). Comparison of Ensemble Simple Feedforward Neural Network and Deep Learning Neural Network on Phishing Detection. In: Alfred, R., Lim, Y., Haviluddin, H., On, C. (eds) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol 603. Springer, Singapore. https://doi.org/10.1007/978-981-15-0058-9_57
Download citation
DOI: https://doi.org/10.1007/978-981-15-0058-9_57
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0057-2
Online ISBN: 978-981-15-0058-9
eBook Packages: EngineeringEngineering (R0)