SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection

被引:0
|
作者
Hendaoui, Fatma [1 ]
Hendaoui, Saloua [2 ]
机构
[1] Univ Hail, Appl Coll, Comp Sci Dept, Hail 55424, Saudi Arabia
[2] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka, Saudi Arabia
关键词
Machine learning; Phishing attacks; URL; Dataset; Efficiency; String-matching;
D O I
10.1016/j.eswa.2024.124896
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Phishing attacks have recently become a real danger that threatens the security of sensitive data. This research paper presents a new approach based on Secure Multi-Party Computation (SMPC) to identify phishing attacks on encrypted emails while ensuring data confidentiality and privacy. The proposed approach, SENTINEY (Securing ENcrypted mulTIparty computatIoN for Enhanced data privacY and phishing detection), combines unsupervised machine learning and string matching techniques to detect phishing links over encrypted data, making it adaptive. Subsequently, an adaptive system dynamically selects the appropriate phishing detection technique taking into account various factors (e.g, the volume of new attacks, the accuracy of the machine learning model, attack specificity and available system resources) is suggested. For efficiency reasons, the learning model uses network virtualization features to improve computational resources. This new approach has shown good performance in taking advantage of network virtualization to create a secure and collaborative environment for the SMPC. The dataset used to train and test the proposal is generated on the basis of real phishing emails, including real phishing URLs and keywords. An in-depth performance analysis evaluated the performance of the proposed approach in terms of efficiency (processing time) and robustness (accuracy, precision, recall and F1 score). Simulation results and comparison with relevant solutions show that the proposed approach achieves superior robustness at lower costs. Using a string-matching approach, the multilayer perceptron achieved the highest accuracy of 98% with a detection time of 0.89 s. On the other hand, Isolation Forest showed high efficiency in combating zero-day phishing attacks. The MLP model combined with other tools achieved an accuracy of 99.4%.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Fair and Secure Multi-Party Computation with Cheater Detection
    Seo, Minhye
    CRYPTOGRAPHY, 2021, 5 (03)
  • [22] Trading correctness for privacy in unconditional multi-party computation (extended abstract)
    Fitzi, M
    Hirt, M
    Maurer, U
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 121 - 136
  • [23] Public Verifiable Privacy-Preserving Multi-Party Computation on Blockchain
    Zhang, Ziyan
    Chen, Liquan
    Jiang, Xinzao
    Yang, Bo
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 531 - 537
  • [24] Conclave: secure multi-party computation on big data
    Volgushev, Nikolaj
    Schwarzkopf, Matte
    Ben Getchell
    Varia, Mayank
    Lapets, Andrei
    Bestavros, Azer
    PROCEEDINGS OF THE FOURTEENTH EUROSYS CONFERENCE 2019 (EUROSYS '19), 2019,
  • [25] Multi-party Computation for Privacy and Security in Machine Learning: a practical review
    Bellini, Alessandro
    Bellini, Emanuele
    Bertini, Massimo
    Almhaithawi, Doaa
    Cuomo, Stefano
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 174 - 179
  • [26] Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain
    Zhou, Jiapeng
    Feng, Yuxiang
    Wang, Zhenyu
    Guo, Danyi
    SENSORS, 2021, 21 (04) : 1 - 17
  • [27] Everlasting Multi-party Computation
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 380 - 397
  • [28] Covert multi-party computation
    Chandran, Nishanth
    Goyal, Vipul
    Ostrovsky, Rafail
    Sahai, Arnit
    48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, : 238 - 248
  • [29] Everlasting Multi-party Computation
    Dominique Unruh
    Journal of Cryptology, 2018, 31 : 965 - 1011
  • [30] Everlasting Multi-party Computation
    Unruh, Dominique
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 965 - 1011