SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection

被引:0
|
作者
Hendaoui, Fatma [1 ]
Hendaoui, Saloua [2 ]
机构
[1] Univ Hail, Appl Coll, Comp Sci Dept, Hail 55424, Saudi Arabia
[2] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka, Saudi Arabia
关键词
Machine learning; Phishing attacks; URL; Dataset; Efficiency; String-matching;
D O I
10.1016/j.eswa.2024.124896
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Phishing attacks have recently become a real danger that threatens the security of sensitive data. This research paper presents a new approach based on Secure Multi-Party Computation (SMPC) to identify phishing attacks on encrypted emails while ensuring data confidentiality and privacy. The proposed approach, SENTINEY (Securing ENcrypted mulTIparty computatIoN for Enhanced data privacY and phishing detection), combines unsupervised machine learning and string matching techniques to detect phishing links over encrypted data, making it adaptive. Subsequently, an adaptive system dynamically selects the appropriate phishing detection technique taking into account various factors (e.g, the volume of new attacks, the accuracy of the machine learning model, attack specificity and available system resources) is suggested. For efficiency reasons, the learning model uses network virtualization features to improve computational resources. This new approach has shown good performance in taking advantage of network virtualization to create a secure and collaborative environment for the SMPC. The dataset used to train and test the proposal is generated on the basis of real phishing emails, including real phishing URLs and keywords. An in-depth performance analysis evaluated the performance of the proposed approach in terms of efficiency (processing time) and robustness (accuracy, precision, recall and F1 score). Simulation results and comparison with relevant solutions show that the proposed approach achieves superior robustness at lower costs. Using a string-matching approach, the multilayer perceptron achieved the highest accuracy of 98% with a detection time of 0.89 s. On the other hand, Isolation Forest showed high efficiency in combating zero-day phishing attacks. The MLP model combined with other tools achieved an accuracy of 99.4%.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [32] Privacy sensitive distributed data mining from multi-party data
    Kargupta, H
    Liu, K
    Ryan, J
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2003, 2665 : 336 - 342
  • [33] Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud
    Raylin Tso
    Abdulhameed Alelaiwi
    Sk Md Mizanur Rahman
    Mu-En Wu
    M. Shamim Hossain
    Journal of Signal Processing Systems, 2017, 89 : 51 - 59
  • [34] Multi-Party Privacy Conflict Detection and Resolution in Social Media
    Chhallani, Rajul D.
    Rao, Jyoti
    Pattewar, Rasika
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 458 - 463
  • [35] Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud
    Tso, Raylin
    Alelaiwi, Abdulhameed
    Rahman, Sk Md Mizanur
    Wu, Mu-En
    Hossain, M. Shamim
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 89 (01): : 51 - 59
  • [36] It is not (only) about privacy: How multi-party computation redefines control, trust, and risk in data sharing
    Agahari, Wirawan
    Ofe, Hosea
    de Reuver, Mark
    ELECTRONIC MARKETS, 2022, 32 (03) : 1577 - 1602
  • [37] It is not (only) about privacy: How multi-party computation redefines control, trust, and risk in data sharing
    Wirawan Agahari
    Hosea Ofe
    Mark de Reuver
    Electronic Markets, 2022, 32 : 1577 - 1602
  • [38] Secure Multi-party Protocols for Privacy Preserving Data Mining
    Ma, Qingkai
    Deng, Ping
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 526 - 537
  • [39] Multi-Party Sequential Data Publishing Under Differential Privacy
    Tang, Peng
    Chen, Rui
    Su, Sen
    Guo, Shanqing
    Ju, Lei
    Liu, Gaoyuan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (09) : 9562 - 9577
  • [40] Privacy-preserving quantum multi-party computation based on circular structure
    Deng, Zhiliang
    Zhang, Ying
    Zhang, Xiaorui
    Li, Lingling
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 120 - 124