SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection

被引:0
|
作者
Hendaoui, Fatma [1 ]
Hendaoui, Saloua [2 ]
机构
[1] Univ Hail, Appl Coll, Comp Sci Dept, Hail 55424, Saudi Arabia
[2] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka, Saudi Arabia
关键词
Machine learning; Phishing attacks; URL; Dataset; Efficiency; String-matching;
D O I
10.1016/j.eswa.2024.124896
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Phishing attacks have recently become a real danger that threatens the security of sensitive data. This research paper presents a new approach based on Secure Multi-Party Computation (SMPC) to identify phishing attacks on encrypted emails while ensuring data confidentiality and privacy. The proposed approach, SENTINEY (Securing ENcrypted mulTIparty computatIoN for Enhanced data privacY and phishing detection), combines unsupervised machine learning and string matching techniques to detect phishing links over encrypted data, making it adaptive. Subsequently, an adaptive system dynamically selects the appropriate phishing detection technique taking into account various factors (e.g, the volume of new attacks, the accuracy of the machine learning model, attack specificity and available system resources) is suggested. For efficiency reasons, the learning model uses network virtualization features to improve computational resources. This new approach has shown good performance in taking advantage of network virtualization to create a secure and collaborative environment for the SMPC. The dataset used to train and test the proposal is generated on the basis of real phishing emails, including real phishing URLs and keywords. An in-depth performance analysis evaluated the performance of the proposed approach in terms of efficiency (processing time) and robustness (accuracy, precision, recall and F1 score). Simulation results and comparison with relevant solutions show that the proposed approach achieves superior robustness at lower costs. Using a string-matching approach, the multilayer perceptron achieved the highest accuracy of 98% with a detection time of 0.89 s. On the other hand, Isolation Forest showed high efficiency in combating zero-day phishing attacks. The MLP model combined with other tools achieved an accuracy of 99.4%.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Privacy preserving sequential pattern mining based on secure multi-party computation
    Ouyang, Weimin
    Huang, Qinhua
    2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 149 - 154
  • [42] Privacy Preserving Multi-Party Computation With Secret Sharing for Trajectory Prediction in VANETs
    Liu, Dengzhi
    Yu, Geng
    Ding, Yongdong
    Zhong, Zhaoman
    Wang, Chen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (12) : 18666 - 18677
  • [43] Privacy preserving multi-party computation delegation for deep learning in cloud computing
    Ma, Xu
    Zhang, Fangguo
    Chen, Xiaofeng
    Shen, Jian
    INFORMATION SCIENCES, 2018, 459 : 103 - 116
  • [44] Privacy-Aware MapReduce Based Multi-Party Secure Skyline Computation
    Ahmed, Saleh
    Qaosar, Mahboob
    Zaman, Asif
    Siddique, Md. Anisuzzaman
    Li, Chen
    Alam, Kazi Md. Rokibul
    Morimoto, Yasuhiko
    INFORMATION, 2019, 10 (06)
  • [45] Smart Contract based Multi-Party Computation with Privacy Preserving and Settlement Addressed
    Pei, Xin
    Li, Xuefeng
    Wu, Xiaochuan
    Sun, Liang
    Zheng, Kaiyan
    PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), 2018, : 133 - 139
  • [46] ON PRIVACY PREFERENCE IN COLLUSION-DETERRENCE GAMES FOR SECURE MULTI-PARTY COMPUTATION
    Wang, Zhaohong
    Cheung, Sen-ching S.
    2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 2044 - 2048
  • [47] Secure Multi-party Differential Privacy
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 28 (NIPS 2015), 2015, 28
  • [48] Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0
    Siddique, Ali Akbar
    Boulila, Wadii
    Alshehri, Mohammed S.
    Ahmed, Fawad
    Gadekallu, Thippa Reddy
    Victor, Nancy
    Qadri, M. Tahir
    Ahmad, Jawad
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 1923 - 1939
  • [49] Privacy preserving clustering for multi-party
    Yang, Weijia
    Huang, Shangteng
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 213 - +
  • [50] Blockchain-Based Multi-Party Authorization for Accessing IPFS Encrypted Data
    Battah, Ammar Ayman
    Madine, Mohammad Moussa
    Alzaabi, Hamad
    Yaqoob, Ibrar
    Salah, Khaled
    Jayaraman, Raja
    IEEE ACCESS, 2020, 8 : 196813 - 196825