Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models

被引:2
|
作者
Jha, Birendra [1 ]
Atre, Medha [1 ]
Rao, Ashwini [1 ]
机构
[1] Eydle Inc, Los Angeles, CA 91107 USA
关键词
Deep Learning; Phishing; Cybersecurity;
D O I
10.1109/TPS-ISA56441.2022.00026
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web-based phishing attacks nowadays exploit popular cloud web hosting services and apps such as Google Sites and Typeform for hosting their attacks. Since these attacks originate from reputable domains and IP addresses of the cloud services, traditional phishing detection methods such as IP reputation monitoring and blacklisting are not very effective. Here we investigate the effectiveness of deep learning models in detecting this class of cloud-based phishing attacks. Specifically, we evaluate deep learning models for three phishing detection methods-LSTM model for URL analysis, YOLOv2 model for logo analysis, and triplet network model for visual similarity analysis. We train the models using well-known datasets and test their performance on cloud-based phishing attacks in the wild. Our results qualitatively explain why the models succeed or fail. Furthermore, our results highlight how combining results from the individual models can improve the effectiveness of detecting cloud-based phishing attacks.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 50 条
  • [21] Detecting Phishing Attacks Using Natural Language Processing And Machine Learning
    Banu, Reshma
    Anand, M.
    Kamath, Akshatha C.
    Ashika, S.
    Ujwala, H. S.
    Harshitha, S. N.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1210 - 1214
  • [22] On detecting and mitigating phishing attacks through featureless machine learning techniques
    Martins de Souza, Cristian H.
    Lemos, Marcilio O. O.
    Dantas Silva, Felipe S.
    Souza Alves, Robinson L.
    INTERNET TECHNOLOGY LETTERS, 2020, 3 (01)
  • [23] Exploration of the Semi-Supervised Learning Approach for Detecting Phishing Attacks
    Jeevan, Vignesh
    Refonaa, J.
    Shaurya, Suraj
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 138 - 143
  • [24] Cloud-based Testbed for Simulation of Cyber Attacks
    Kouril, Daniel
    Rebok, Tomas
    Jirsik, Tomas
    Cegan, Jakub
    Drasar, Martin
    Vizvary, Martin
    Vykopal, Jan
    2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [25] Cloud-Based Machine Learning Models as Covert Communication Channels
    Krauss, Torsten
    Stang, Jasper
    Dmitrienko, Alexandra
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 141 - 157
  • [26] Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks
    Mahmood, Syed Hasan Amin
    Abbasi, Syed Mustafa Ali
    Abbasi, Ahmed
    Zaffar, Fareed
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 224 - 229
  • [27] PhishVision: A Deep Learning Based Visual Brand Impersonation Detector for Identifying Phishing Attacks
    Graziano, Giovanni
    Ucci, Daniele
    Bisio, Federica
    Oneto, Luca
    OPTIMIZATION, LEARNING ALGORITHMS AND APPLICATIONS, PT I, OL2A 2023, 2024, 1981 : 123 - 134
  • [28] The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs
    Gopali, Saroj
    Namin, Akbar S.
    Abri, Faranak
    Jones, Keith S.
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1064 - 1066
  • [29] NDLP Phishing: A Fine-Tuned Application to Detect Phishing Attacks Based on Natural Language Processing and Deep Learning
    Benavides-Astudillo E.
    Fuertes W.
    Sanchez-Gordon S.
    Nuñez-Agurto D.
    International Journal of Interactive Mobile Technologies, 2024, 18 (10): : 173 - 190
  • [30] Enhancing Cloud Security: An Optimization-based Deep Learning Model for Detecting Denial-of-Service Attacks
    Alhazmi, Lamia
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 330 - 338