Optimal Deep Belief Network Enabled Cybersecurity Phishing Email Classification

被引:1
|
作者
Dutta, Ashit Kumar [1 ]
Meyyappan, T. [2 ]
Qureshi, Basit [3 ]
Alsanea, Majed [4 ]
Abulfaraj, Anas Waleed [5 ]
Al Faraj, Manal M. [1 ]
Sait, Abdul Rahaman Wahab [6 ]
机构
[1] AlMaarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, Riyadh 13713, Saudi Arabia
[2] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
[3] Prince Sultan Univ, Dept Comp Sci, Riyadh, Saudi Arabia
[4] Arabeast Coll, Dept Comp, Riyadh 11583, Saudi Arabia
[5] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 23613, Saudi Arabia
[6] King Faisal Univ, Dept Arch & Commun, Al Hasa 31982, Hofuf, Saudi Arabia
来源
关键词
Cybersecurity; phishing email; data classification; deep learning; biogeography based optimization; hyperparameter tuning;
D O I
10.32604/csse.2023.028984
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, developments of Internet and cloud technologies have resulted in a considerable rise in utilization of online media for day to day lives. It results in illegal access to users' private data and compromises it. Phishing is a popular attack which tricked the user into accessing malicious data and gaining the data. Proper identification of phishing emails can be treated as an essential process in the domain of cybersecurity. This article focuses on the design of biogeography based optimization with deep learning for Phishing Email detection and classification (BBODL-PEDC) model. The major intention of the BBODL-PEDC model is to distinguish emails between legitimate and phishing. The BBODL-PEDC model initially performs data pre-processing in three levels namely email cleaning, tokenization, and stop word elimination. Besides, TF-IDF model is applied for the extraction of useful feature vectors. Moreover, optimal deep belief network (DBN) model is used for the email classification and its efficacy can be boosted by the BBO based hyperparameter tuning process. The performance validation of the BBODL-PEDC model can be performed using benchmark dataset and the results are assessed under several dimensions. Extensive comparative studies reported the superior outcomes of the BBODL-PEDC model over the recent approaches.
引用
收藏
页码:2701 / 2713
页数:13
相关论文
共 50 条
  • [21] An optimization-based deep belief network for the detection of phishing e-mails
    Arshey, M.
    Viji, Angel K. S.
    DATA TECHNOLOGIES AND APPLICATIONS, 2020, 54 (04) : 529 - 549
  • [22] Text Sentiment Classification Based on Deep Belief Network
    Zhang Q.
    He X.
    Wang H.
    Meng S.
    Data Analysis and Knowledge Discovery, 2019, 3 (04) : 71 - 79
  • [23] A DIVERSIFIED DEEP BELIEF NETWORK FOR HYPERSPECTRAL IMAGE CLASSIFICATION
    Zhong, P.
    Gong, Z. Q.
    Schonlieb, C.
    XXIII ISPRS CONGRESS, COMMISSION VII, 2016, 41 (B7): : 443 - 449
  • [24] Machine Fault Classification Using Deep Belief Network
    Chen, Zhuyun
    Zeng, Xueqiong
    Li, Weihua
    Liao, Guanglan
    2016 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE PROCEEDINGS, 2016, : 831 - 836
  • [25] Signal Modulation Classification Based on Deep Belief Network
    Li, Wenwen
    Dou, Zheng
    Wang, Can
    Zhang, Yu
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [26] A Multichannel Deep Belief Network for the Classification of EEG Data
    Al-kaysi, Alaa M.
    Al-Ani, Ahmed
    Boonstra, Tjeerd W.
    NEURAL INFORMATION PROCESSING, ICONIP 2015, PT IV, 2015, 9492 : 38 - 45
  • [27] Music Mood Classification via Deep Belief Network
    Li, Juncen
    Gao, Sheng
    Han, Ning
    Fang, Zhou
    Liao, Jianxin
    2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2015, : 1241 - 1245
  • [28] Application of Alternating Deep Belief Network in Image Classification
    Shi, Tao
    Zhang, Chunlei
    Li, Fujin
    Liu, Weimin
    Huo, Meijie
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 1853 - 1856
  • [29] A Classification Method using Deep Belief Network for Phonocardiogram Signal Classification
    Faturrahman, Moh
    Wasito, Ito
    Ghaisani, Fakhirah Dianah
    Mufidah, Ratna
    2017 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2017, : 283 - 289
  • [30] Netphishing: Network and Linguistic Analysis of Phishing Email Subject Lines
    Ferreira, Ana
    Teles, Soraia
    Chilro, Rui
    Sosa-Napolskij, Milaydis
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS (ICEIS), VOL 2, 2020, : 250 - 257