Homoglyph Attack Detection Model Using Machine Learning and Hash Function

Author:

Almuhaideb Abdullah M.ORCID,Aslam NidaORCID,Alabdullatif Almaha,Altamimi Sarah,Alothman Shooq,Alhussain Amnah,Aldosari Waad,Alsunaidi Shikah J.ORCID,Alissa Khalid A.ORCID

Abstract

Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting a spoofing/fake site that appears to be a visual clone of a legitimate site. Several Unicode characters are visually identical to ASCII characters. This similarity in characters is generally known as homoglyphs. Malicious adversaries utilize homoglyphs in URLs and DNS domains to target organizations. To reduce the risks caused by phishing attacks, effective ways of detecting phishing websites are urgently required. This paper proposes a homoglyph attack detection model that combines a hash function and machine learning. There are two phases to the model approach. The machine was being trained during the development phase. The deployment phase involved deploying the model with a Java interface and testing the outcomes through actual user interaction. The results are more accurate when the URL is hashed, as any little changes to the URL can be recognized. The homoglyph detector can be developed as a stand-alone software that is used as the initial step in requesting a webpage as it enhances browser security and protects websites from phishing attempts. To verify the effectiveness, we compared the proposed model on several criteria to existing phishing detection methods. By using the hash function, the proposed security features increase the overall security of the homoglyph attack detection in terms of accuracy, integrity, and availability. The experiment results showed that the model can detect phishing sites with an accuracy of 99.8% using Random Forest, and the hash function improves the accuracy of homoglyph attack detection.

Funder

Saudi Aramco Cybersecurity Chair, Imam Abdulrahman Bin Faisal University, Saudi Arabia

Publisher

MDPI AG

Subject

Control and Optimization,Computer Networks and Communications,Instrumentation

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation;Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security;2024-06-24

2. Phishing Attacks and Detection Techniques: A Systematic Review;2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG);2024-04-02

3. Featured Papers on Network Security and Privacy;Journal of Sensor and Actuator Networks;2024-02-01

4. From Homoglyphs to Enhancedhomoglyphs: Enhancing NLP Backdoor Strategies through Character Substitution;2023 Eleventh International Conference on Advanced Cloud and Big Data (CBD);2023-12-18

5. Synthetized Multilanguage OCR Using CRNN and SVTR Models for Realtime Collaborative Tools;Applied Sciences;2023-03-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3