Cloud-based email phishing attack using machine and deep learning algorithm

被引:0
|
作者
Umer Ahmed Butt
Rashid Amin
Hamza Aldabbas
Senthilkumar Mohan
Bader Alouffi
Ali Ahmadian
机构
[1] University of Engineering and Technology,Department of Computer Science
[2] University of Chakwal,Department of Computer Science
[3] Al-Balqa Applied University,Prince Abdullah Bin Ghazi Faculty of Information and Communication Technology
[4] Vellore Institute of Technology,School of Information Technology and Engineering
[5] Taif University,Department of Computer Science, College of Computers and Information Technology
[6] Near East University,Department of Mathematics
来源
关键词
Phishing detection; Extract feature; Label data; Feature selection; Text processing; Machine learning; Long short term memory (LSTM); Support vector machine (SVM) classification; Phishing dataset; [inline-graphic not available: see fulltext]; [inline-graphic not available: see fulltext]; [inline-graphic not available: see fulltext]; [inline-graphic not available: see fulltext]; [inline-graphic not available: see fulltext];
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive data for individuals or groups. Financial data, credit reports, and other sensitive data are often sent via the Internet. Phishing is a fraudster's technique used to get sensitive data from users by seeming to come from trusted sources. The sender can persuade you to give secret data by misdirecting in a phished email. The main problem is email phishing attacks while sending and receiving the email. The attacker sends spam data using email and receives your data when you open and read the email. In recent years, it has been a big problem for everyone. This paper uses different legitimate and phishing data sizes, detects new emails, and uses different features and algorithms for classification. A modified dataset is created after measuring the existing approaches. We created a feature extracted comma-separated values (CSV) file and label file, applied the support vector machine (SVM), Naive Bayes (NB), and long short-term memory (LSTM) algorithm. This experimentation considers the recognition of a phished email as a classification issue. According to the comparison and implementation, SVM, NB and LSTM performance is better and more accurate to detect email phishing attacks. The classification of email attacks using SVM, NB, and LSTM classifiers achieve the highest accuracy of 99.62%, 97% and 98%, respectively.
引用
收藏
页码:3043 / 3070
页数:27
相关论文
共 50 条
  • [21] Classification of dental implant systems using cloud-based deep learning algorithm: an experimental study
    Kong, Hyun Jun
    JOURNAL OF YEUNGNAM MEDICAL SCIENCE, 2023, 40 : S29 - S36
  • [22] Detection of adversarial phishing attack using machine learning techniques
    Sudar, K. Muthamil
    Rohan, M.
    Vignesh, K.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [23] A Cloud-based Architecture for Network Attack Signature Learning
    Hamdi, Omessaad
    Mbaye, Maissa
    Krief, Francine
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [24] Email bombing attack detection and mitigation using machine learning
    Shukla, Sanjeev
    Misra, Manoj
    Varshney, Gaurav
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 2939 - 2949
  • [25] Phishing Detection Using Machine Learning Algorithm.
    Tanimu, Jibrilla
    Shiaeles, Stavros
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 317 - 322
  • [26] Cement strength prediction using cloud-based machine learning techniques
    Kumar, Nand
    Naranje, Vishal
    Salunkhe, Sachin
    JOURNAL OF STRUCTURAL INTEGRITY AND MAINTENANCE, 2020, 5 (04) : 244 - 251
  • [27] Adaptive resource planning for cloud-based services using machine learning
    Nawrocki, Piotr
    Grzywacz, Mikolaj
    Sniezynski, Bartlomiej
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 152 : 88 - 97
  • [28] Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
    Attou, Hanaa
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    Farhaoui, Yousef
    BIG DATA MINING AND ANALYTICS, 2023, 6 (03) : 311 - 320
  • [29] Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm
    Amjad, Aroosh
    Alyas, Tahir
    Farooq, Umer
    Tariq, Muhammad Arsian
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2019, 6 (23) : 1 - 8
  • [30] A Framework for Assuring the Conformance of Cloud-based Email
    Willett, Melanie
    Von Solms, Rossouw
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 168 - 173