Directed adversarial sampling attacks on phishing detection

被引:1
|
作者
Shirazi, Hossein [1 ]
Bezawada, Bruhadeshwar [2 ]
Ray, Indrakshi [1 ]
Anderson, Chuck [1 ]
机构
[1] Colorado State Univ, Ft Collins, CO 80523 USA
[2] Indian Inst Technol Jammu, Jammu, Jammu & Kashmir, India
关键词
Phishing; machine learning; adversarial sampling; classifiers; FEATURES;
D O I
10.3233/JCS-191411
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing websites trick honest users into believing that they interact with a legitimate website and capture sensitive information, such as user names, passwords, credit card numbers, and other personal information. Machine learning is a promising technique to distinguish between phishing and legitimate websites. However, machine learning approaches are susceptible to adversarial learning attacks where a phishing sample can bypass classifiers. Our experiments on publicly available datasets reveal that the phishing detection mechanisms are vulnerable to adversarial learning attacks. We investigate the robustness of machine learning-based phishing detection in the face of adversarial learning attacks. We propose a practical approach to simulate such attacks by generating adversarial samples through direct feature manipulation. To enhance the sample's success probability, we describe a clustering approach that guides an attacker to select the best possible phishing samples that can bypass the classifier by appearing as legitimate samples. We define the notion of vulnerability level for each dataset that measures the number of features that can be manipulated and the cost for such manipulation. Further, we clustered phishing samples and showed that some clusters of samples are more likely to exhibit higher vulnerability levels than others. This helps an adversary identify the best candidates of phishing samples to generate adversarial samples at a lower cost. Our finding can be used to refine the dataset and develop better learning models to compensate for the weak samples in the training dataset.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 50 条
  • [1] Adversarial Sampling Attacks Against Phishing Detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Charles
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 83 - 101
  • [2] Detection of phishing attacks
    Baykara, Muhammet
    Gurel, Zahit Ziya
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 399 - 403
  • [3] Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
    Rajivan, Prashanth
    Gonzalez, Cleotilde
    [J]. FRONTIERS IN PSYCHOLOGY, 2018, 9
  • [4] An overview of phishing attacks and their detection techniques
    Dadkhah, Mehdi
    Jazi, Mohammad Davarpanah
    Mobarakeh, Majid Saidi
    Shamshirband, Shahaboddin
    Wang, Xiaojun
    Raste, Sachin
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (04) : 187 - 195
  • [5] Online detection and prevention of phishing attacks
    Institute of Communications Engineering, PLA Univ. of Sci. and Tech., Nanjing 210007, China
    [J]. Jiefangjun Ligong Daxue Xuebao, 2007, 2 (133-138): : 133 - 138
  • [6] A Framework for Detection and Measurement of Phishing Attacks
    Garera, Sujata
    Provos, Niels
    Chew, Monica
    Rubin, Aviel D.
    [J]. WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, 2007, : 1 - 8
  • [7] An overview of phishing attacks and their detection techniques
    Dadkhah M.
    Jazi M.D.
    Mobarakeh M.S.
    Shamshirband S.
    Wang X.
    Raste S.
    [J]. Dadkhah, Mehdi (dadkhah80@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 187 - 195
  • [8] Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks
    AlEroud, Ahmed
    Karabatis, George
    [J]. PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 53 - 60
  • [9] PDGAN: Phishing Detection With Generative Adversarial Networks
    Al-Ahmadi S.
    Alotaibi A.
    Alsaleh O.
    [J]. IEEE Access, 2022, 10 : 42459 - 42468
  • [10] Adversarial Robustness of Phishing Email Detection Models
    Gholampour, Parisa Mehdi
    Verma, Rakesh M.
    [J]. PROCEEDINGS OF THE 9TH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2023, 2023, : 67 - 76