SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection

被引:0
|
作者
Hendaoui, Fatma [1 ]
Hendaoui, Saloua [2 ]
机构
[1] Univ Hail, Appl Coll, Comp Sci Dept, Hail 55424, Saudi Arabia
[2] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka, Saudi Arabia
关键词
Machine learning; Phishing attacks; URL; Dataset; Efficiency; String-matching;
D O I
10.1016/j.eswa.2024.124896
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Phishing attacks have recently become a real danger that threatens the security of sensitive data. This research paper presents a new approach based on Secure Multi-Party Computation (SMPC) to identify phishing attacks on encrypted emails while ensuring data confidentiality and privacy. The proposed approach, SENTINEY (Securing ENcrypted mulTIparty computatIoN for Enhanced data privacY and phishing detection), combines unsupervised machine learning and string matching techniques to detect phishing links over encrypted data, making it adaptive. Subsequently, an adaptive system dynamically selects the appropriate phishing detection technique taking into account various factors (e.g, the volume of new attacks, the accuracy of the machine learning model, attack specificity and available system resources) is suggested. For efficiency reasons, the learning model uses network virtualization features to improve computational resources. This new approach has shown good performance in taking advantage of network virtualization to create a secure and collaborative environment for the SMPC. The dataset used to train and test the proposal is generated on the basis of real phishing emails, including real phishing URLs and keywords. An in-depth performance analysis evaluated the performance of the proposed approach in terms of efficiency (processing time) and robustness (accuracy, precision, recall and F1 score). Simulation results and comparison with relevant solutions show that the proposed approach achieves superior robustness at lower costs. Using a string-matching approach, the multilayer perceptron achieved the highest accuracy of 98% with a detection time of 0.89 s. On the other hand, Isolation Forest showed high efficiency in combating zero-day phishing attacks. The MLP model combined with other tools achieved an accuracy of 99.4%.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] SECURE MULTI-PARTY COMPUTATION PROTOCOL FOR STATISTICAL COMPUTATION ON ENCRYPTED DATA
    Pathak, Rohit
    Joshi, Satyadhar
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 78 - +
  • [2] Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data
    Pathak, Rohit
    Joshi, Satyadhar
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 412 - +
  • [3] Privacy in Multi-party Computation in MapReduce
    Ferdaus, Syeda Israt
    Adnan, Muhammad Abdullah
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 365 - 369
  • [4] Partially Encrypted Multi-Party Computation for Federated Learning
    Sotthiwat, Ekanut
    Zhen, Liangli
    Li, Zengxiang
    Zhang, Chi
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 828 - 835
  • [5] Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data
    Ding, Xiaofeng
    Wang, Zuan
    Zhou, Pan
    Choo, Kim-Kwang Raymond
    Jin, Hai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4589 - 4604
  • [6] Application of Randomness for Security and Privacy in Multi-Party Computation
    Saha, Rahul
    Kumar, Gulshan
    Geetha, G.
    Conti, Mauro
    Buchanan, William J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5694 - 5705
  • [7] Securing of Clouds Based on Lightweight Secure Multi-party Computation
    Takahashi, Kouta
    Sato, Fumiaki
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 452 - 464
  • [8] Multi-Party Computation in IoT for Privacy-Preservation
    Goyal, Himanshu
    Saha, Sudipta
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 1280 - 1281
  • [9] Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation
    Mainali, Pradip
    Shepherd, Carlton
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [10] Privacy preserving distributed data mining based on secure multi-party computation
    Liu, Jun
    Tian, Yuan
    Zhou, Yu
    Xiao, Yang
    Ansari, Nirwan
    COMPUTER COMMUNICATIONS, 2020, 153 : 208 - 216