A comprehensive survey of AI-enabled phishing attacks detection techniques

被引:123
|
作者
Basit, Abdul [1 ]
Zafar, Maham [1 ]
Liu, Xuan [2 ]
Javed, Abdul Rehman [3 ]
Jalil, Zunera [3 ]
Kifayat, Kashif [3 ]
机构
[1] Air Univ, Dept Comp Sci, E-9, Islamabad, Pakistan
[2] Yangzhou Univ, Sch Informat Engn, Yangzhou, Jiangsu, Peoples R China
[3] Air Univ, Dept Cyber Secur, E-9, Islamabad, Pakistan
关键词
Phishing attack; Security threats; Advanced phishing techniques; Cyberattack; Internet security; Machine learning; Deep learning; Hybrid learning; FEATURE-SELECTION; PROTECTION; ALGORITHM; WEBSITES; FEATURES; EMAIL;
D O I
10.1007/s11235-020-00733-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.
引用
收藏
页码:139 / 154
页数:16
相关论文
共 50 条
  • [1] A comprehensive survey of AI-enabled phishing attacks detection techniques
    Abdul Basit
    Maham Zafar
    Xuan Liu
    Abdul Rehman Javed
    Zunera Jalil
    Kashif Kifayat
    [J]. Telecommunication Systems, 2021, 76 : 139 - 154
  • [2] A Comprehensive Survey of Recent Phishing Attacks Detection Techniques
    Priya, S.
    Gutema, Danat
    Singh, Shweta
    [J]. 2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,
  • [3] A Comprehensive Survey of Recent Phishing Attacks Detection Techniques
    Priya, S.
    Gutema, Danat
    Singh, Shweta
    [J]. 2024 5th International Conference on Innovative Trends in Information Technology, ICITIIT 2024, 2024,
  • [4] A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer
    Chang, Jingdong
    Li, Zhao
    Kaveh, Masoud
    Zhang, Yifan
    Li, Jiajun
    Yan, Zheng
    [J]. 2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [5] A Comprehensive Survey of Phishing Email Detection and Protection Techniques
    Kumar Birthriya, Santosh
    Jain, Ankit Kumar
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (04): : 411 - 440
  • [6] A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
    Kumar, Surendra
    Dwivedi, Mridula
    Kumar, Mohit
    Gill, Sukhpal Singh
    [J]. COMPUTER SCIENCE REVIEW, 2024, 53
  • [7] An overview of phishing attacks and their detection techniques
    Dadkhah, Mehdi
    Jazi, Mohammad Davarpanah
    Mobarakeh, Majid Saidi
    Shamshirband, Shahaboddin
    Wang, Xiaojun
    Raste, Sachin
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (04) : 187 - 195
  • [8] An overview of phishing attacks and their detection techniques
    Dadkhah M.
    Jazi M.D.
    Mobarakeh M.S.
    Shamshirband S.
    Wang X.
    Raste S.
    [J]. Dadkhah, Mehdi (dadkhah80@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 187 - 195
  • [9] AI-enabled learning techniques for Internet of Things communications
    Souri, Alireza
    Chen, Mu-Yen
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2021, 27 (03) : 203 - 204
  • [10] AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE
    Bera, Basudeb
    Das, Ashok Kumar
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Hsiao, Kuei-Fang
    Park, YoungHo
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2021, 10 (05) : 82 - 92