Author:
Elberri Mustafa Ahmed,Tokeşer Ümit,Rahebi Javad,Lopez-Guede Jose Manuel
Abstract
AbstractPhishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting phishing attacks. However, traditional CNN-based image classification methods face limitations in effectively identifying fake pages. To address this challenge, we propose an image-based coding approach for detecting phishing attacks using a CNN-LSTM hybrid model. This approach combines SMOTE, an enhanced GAN based on the Autoencoder network, and swarm intelligence algorithms to balance the dataset, select informative features, and generate grayscale images. Experiments on three benchmark datasets demonstrate that the proposed method achieves superior accuracy, precision, and sensitivity compared to other techniques, effectively identifying phishing attacks and enhancing online security.
Funder
Universidad del País Vasco
Publisher
Springer Science and Business Media LLC
Reference52 articles.
1. Greco, F., Desolda, G., Esposito, A.: Explaining phishing attacks: an XAI approach to enhance user awareness and trust. In: Proc. of the Italian Conference on CyberSecurity (ITASEC ‘23) (2023)
2. Buono, P., Desolda, G., Greco, F., Piccinno, A.: Let warnings interrupt the interaction and explain: designing and evaluating phishing email warnings. In: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, pp 1–6 (2023)
3. Marin, I.A., Burda, P., Zannone, N., Allodi, L.: The influence of human factors on the intention to report phishing emails. In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, pp 1–18 (2023)
4. Xu, T., Singh, K., Rajivan, P.: Personalized persuasion: quantifying susceptibility to information exploitation in spear-phishing attacks. Appl. Ergon. 108, 103908 (2023)
5. Lee, Y.Y., Gan, C.L., Liew, T.W.: Susceptibility to instant messaging phishing attacks: does systematic information processing differ between genders? Crime Prev. Community Saf. 25(2), 179–203 (2023)