Skip to main content

Comparison of Ensemble Simple Feedforward Neural Network and Deep Learning Neural Network on Phishing Detection

  • Conference paper
Computational Science and Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 603))

Abstract

Phishing attack is one of wide spread cybercrimes due to the advancement of the Internet. There are many forms of phishing attack and the most common one is through email. The attacker tries to pretend by sending email from an official organization or body to deceive the user in giving in their credential user name and password. The username and password are then used for malicious purpose. Many methods have been used to detect these phishing attacks; however, the attack evolved too quickly to be solved by manual approach. Therefore, automated phishing detection through artificial intelligence approach would be more feasible. In this paper, a comparison study for phishing detection between two neural networks which are the feedforward neural network and the deep learning neural network is carried out. The result is empirically evaluated to determine which method performs better in phishing detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Vayansky, I., Kumar, S.L.: Phishing–challenges and solutions. Computer Fraud & Security (1), 15-20 (2018).

    Google Scholar 

  2. Gupta, B. B., Tewari, A., Jain, A. K., Agrawal, D. P.: Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications 28(12), 3629-3654 (2017).

    Google Scholar 

  3. Gupta, B. B., Arachchilage, N. A., Psannis, K. E.: Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommunication Systems 67(2), 247-267 (2018).

    Google Scholar 

  4. Chin, K. O., Chang, K. T., Teo, J., Alfred, R., Cheng, W., Tan, T. G.: Self-Evaluation of RTS Troop’s Performance. Journal Teknologi. UTM Press. 76(12), 119–126 (2015).

    Google Scholar 

  5. Tan, T. G., Yong, Y. N., Chin, K. O., Teo, J., Alfred, R.: Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm. CCIS 378, Springer-Verlag Berlin Heidelberg, 135–146 (2013).

    Google Scholar 

  6. Ian, K. W., Chin, K. O., Alfred, R., Asri A. A. A., Tan, T. G., Anthony, P.: A Review of Computer Vision Methods for Fruit Recognition. Advanced Science Letters 24(2), 1538-1542 (2018).

    Google Scholar 

  7. Connie, L., Chin, K. O., Anthony, P.: A Review of Automatic License Plate Recognition System in Mobile based Platform. Journal of Telecommunication, Electronic and Computer Engineering 10(3-2), 77-82 (2018).

    Google Scholar 

  8. Chin, K. O., Teo, K. Y., Alfred, R., Teo, J., Anthony, P., Cheng, W.: Backpropagation Neural Ensemble for Localizing and Recognizing Non-Standardized Malaysia’s Car Plates. International Journal on Advanced Science, Engineering and Information Technology 6 (2016).

    Google Scholar 

  9. Chang, S. V., Chin, K. O., Gan, K. S., Alfred, R., Anthony, P.: External Constraints of Neural Cognition for CIMB Stock Closing Price Prediction. UPM Press (2017).

    Google Scholar 

  10. Phang, W. S., Tan, L. I., Anthony, P., Chin, K. O.: Improving the Accuracy of Stock Price Prediction Using Ensemble Neural Network 24(2), 1524-1527 (2018).

    Google Scholar 

  11. Gupta, N.: Artificial neural network. Network and Complex Systems 3(1), 24-28 (2013).

    Google Scholar 

  12. Chang, S. V., Gan, K. S., Chin, K. O., Alfred, R., Anthony, P.: A review of stock market prediction with Artificial neural network (ANN). In 2013 IEEE International Conference on Control System, Computing and Engineering, pp. 477-482. IEEE (2013).

    Google Scholar 

  13. Teraguchi, N. C. R. L. Y., Mitchell, J. C.: Client-side defense against web-based identity theft. Computer Science Department, Stanford University (2004).

    Google Scholar 

  14. Prakash, P., Kumar, M., Kompella, R. R., Gupta, M.: Phishnet: predictive blacklisting to detect phishing attacks. In 2010 Proceedings IEEE INFOCOM, pp. 1-5. IEEE (2010).

    Google Scholar 

  15. Fu, A. Y., Wenyin, L., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE transactions on dependable and secure computing 3(4), 301-311 (2006).

    Google Scholar 

  16. Mao, J., Li, P., Li, K., Wei, T., Liang, Z.: BaitAlarm: detecting phishing sites using similarity in fundamental visual features. In 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 790-795. IEEE (2013).

    Google Scholar 

  17. Chandrasekaran, M., Narayanan, K., & Upadhyaya, S.: Phishing email detection based on structural properties. In NYS cyber security conference (Vol. 3). (2006).

    Google Scholar 

  18. Sanchez, F., Duan, Z.: A sender-centric approach to detecting phishing emails. In 2012 International Conference on Cyber Security, pp. 32-39. IEEE (2012).

    Google Scholar 

  19. Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, pp. 60-69. ACM (2007).

    Google Scholar 

  20. Mohammad, R., McCluskey, T. L., Thabtah, F. A.: Predicting phishing websites using neural network trained with back-propagation. World Congress in Computer Science, Computer Engineering, and Applied Computing. (2013).

    Google Scholar 

  21. Zhang, N., Yuan, Y.: Phishing detection using neural network. Department of Computer Science, Department of Statistics, Stanford University. CA (2013).

    Google Scholar 

  22. Jameel, N. G. M., George, L. E.: Detection of phishing emails using feed forward neural network. International Journal of Computer Applications 77(7). (2013).

    Google Scholar 

  23. Hansen, L. K., Salamon, P.: Neural network ensembles. IEEE Transactions on Pattern Analysis & Machine Intelligence, (10), 993-1001 (1990).

    Google Scholar 

Download references

Acknowledgement

This project is partially supported by university SBK0366-2017 research grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin Kim On .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Soon, G.K., Chiang, L.C., On, C.K., Rusli, N.M., Fun, T.S. (2020). Comparison of Ensemble Simple Feedforward Neural Network and Deep Learning Neural Network on Phishing Detection. In: Alfred, R., Lim, Y., Haviluddin, H., On, C. (eds) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol 603. Springer, Singapore. https://doi.org/10.1007/978-981-15-0058-9_57

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0058-9_57

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0057-2

  • Online ISBN: 978-981-15-0058-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics