• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

对人工智能驱动的网络钓鱼攻击检测技术的全面调查。

A comprehensive survey of AI-enabled phishing attacks detection techniques.

作者信息

Basit Abdul, Zafar Maham, Liu Xuan, Javed Abdul Rehman, Jalil Zunera, Kifayat Kashif

机构信息

Department of Computer Science, Air University, E-9, Islamabad, Pakistan.

School of Information Engineering, Yangzhou University, Yangzhou, China.

出版信息

Telecommun Syst. 2021;76(1):139-154. doi: 10.1007/s11235-020-00733-2. Epub 2020 Oct 23.

DOI:10.1007/s11235-020-00733-2
PMID:33110340
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7581503/
Abstract

In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.

摘要

近年来,网络钓鱼攻击已成为互联网用户、政府和服务提供组织面临的最突出攻击之一。在网络钓鱼攻击中,攻击者通过使用伪造电子邮件或虚假网站收集客户的敏感数据(即用户账户登录详细信息、信用卡/借记卡号码等)。网络钓鱼网站是在线社交工程攻击的常见切入点,包括网站上的众多欺诈行为。在这类攻击中,攻击者通过复制合法网站的行为创建网页,并通过垃圾邮件、短信或社交网络向目标受害者发送网址。为了全面了解网络钓鱼攻击,本文对人工智能(AI)技术进行了文献综述:用于网络钓鱼攻击检测的机器学习、深度学习、混合学习和基于场景的技术。本文还对每种人工智能技术检测网络钓鱼攻击的不同研究进行了比较,并考察了这些方法的优缺点。此外,本文还全面阐述了网络钓鱼攻击当前面临的一系列挑战以及该领域未来的研究方向。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/9db2de733234/11235_2020_733_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/fede9548b01a/11235_2020_733_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/f4e373d057ae/11235_2020_733_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/6c1b7d398a7b/11235_2020_733_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/bac2b4a4dcf9/11235_2020_733_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/32a48cd11e51/11235_2020_733_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/9db2de733234/11235_2020_733_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/fede9548b01a/11235_2020_733_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/f4e373d057ae/11235_2020_733_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/6c1b7d398a7b/11235_2020_733_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/bac2b4a4dcf9/11235_2020_733_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/32a48cd11e51/11235_2020_733_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/16e2/7581503/9db2de733234/11235_2020_733_Fig6_HTML.jpg

相似文献

1
A comprehensive survey of AI-enabled phishing attacks detection techniques.对人工智能驱动的网络钓鱼攻击检测技术的全面调查。
Telecommun Syst. 2021;76(1):139-154. doi: 10.1007/s11235-020-00733-2. Epub 2020 Oct 23.
2
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.一种使用机器学习的诱人广告网络钓鱼攻击检测混合方法。
Sensors (Basel). 2023 Sep 25;23(19):8070. doi: 10.3390/s23198070.
3
Cloud-based email phishing attack using machine and deep learning algorithm.基于云的使用机器学习和深度学习算法的电子邮件网络钓鱼攻击。
Complex Intell Systems. 2023;9(3):3043-3070. doi: 10.1007/s40747-022-00760-3. Epub 2022 Jun 2.
4
Datasets for phishing websites detection.用于网络钓鱼网站检测的数据集。
Data Brief. 2020 Oct 23;33:106438. doi: 10.1016/j.dib.2020.106438. eCollection 2020 Dec.
5
Detecting phishing websites using machine learning technique.利用机器学习技术检测钓鱼网站。
PLoS One. 2021 Oct 11;16(10):e0258361. doi: 10.1371/journal.pone.0258361. eCollection 2021.
6
Improving the phishing website detection using empirical analysis of Function Tree and its variants.通过对功能树及其变体进行实证分析来改进网络钓鱼网站检测
Heliyon. 2021 Jun 29;7(7):e07437. doi: 10.1016/j.heliyon.2021.e07437. eCollection 2021 Jul.
7
An intelligent cyber security phishing detection system using deep learning techniques.一种使用深度学习技术的智能网络安全网络钓鱼检测系统。
Cluster Comput. 2022;25(6):3819-3828. doi: 10.1007/s10586-022-03604-4. Epub 2022 May 14.
8
A hybrid DNN-LSTM model for detecting phishing URLs.一种用于检测网络钓鱼网址的深度神经网络与长短期记忆网络混合模型。
Neural Comput Appl. 2023;35(7):4957-4973. doi: 10.1007/s00521-021-06401-z. Epub 2021 Aug 8.
9
Binary Hunter-Prey Optimization with Machine Learning-Based Cybersecurity Solution on Internet of Things Environment.物联网环境下基于机器学习的网络安全解决方案的二进制捕食者-猎物优化算法
Sensors (Basel). 2023 Aug 16;23(16):7207. doi: 10.3390/s23167207.
10
A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators.基于深度学习的现代安全中基于统一资源定位器的网络钓鱼检测创新技术。
Sensors (Basel). 2023 Apr 30;23(9):4403. doi: 10.3390/s23094403.

引用本文的文献

1
Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models.推进网络钓鱼电子邮件检测:深度学习模型的比较研究
Sensors (Basel). 2024 Mar 24;24(7):2077. doi: 10.3390/s24072077.
2
ML-Based Detection of DDoS Attacks Using Evolutionary Algorithms Optimization.基于机器学习并采用进化算法优化的分布式拒绝服务攻击检测
Sensors (Basel). 2024 Mar 5;24(5):1672. doi: 10.3390/s24051672.
3
Investigating the role of Cybersecurity's perceived threats in the adoption of health information systems.调查网络安全方面的感知威胁在健康信息系统采用过程中的作用。
Heliyon. 2023 Dec 3;10(1):e22947. doi: 10.1016/j.heliyon.2023.e22947. eCollection 2024 Jan 15.
4
Binary Hunter-Prey Optimization with Machine Learning-Based Cybersecurity Solution on Internet of Things Environment.物联网环境下基于机器学习的网络安全解决方案的二进制捕食者-猎物优化算法
Sensors (Basel). 2023 Aug 16;23(16):7207. doi: 10.3390/s23167207.
5
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19.新冠疫情骗局:新冠疫情期间网络钓鱼攻击及其应对措施调查
IET Inf Secur. 2022 Sep;16(5):324-345. doi: 10.1049/ise2.12073. Epub 2022 Jul 4.
6
A Deep Learning Filter that Blocks Phishing Campaigns Using Intelligent English Text Recognition Methods.一种使用智能英文文本识别方法阻止网络钓鱼活动的深度学习过滤器。
Appl Bionics Biomech. 2022 May 30;2022:5036026. doi: 10.1155/2022/5036026. eCollection 2022.
7
Applications of deep learning for phishing detection: a systematic literature review.深度学习在网络钓鱼检测中的应用:一项系统的文献综述。
Knowl Inf Syst. 2022;64(6):1457-1500. doi: 10.1007/s10115-022-01672-x. Epub 2022 May 23.
8
COVID-19 malicious domain names classification.新型冠状病毒肺炎恶意域名分类
Expert Syst Appl. 2022 Oct 15;204:117553. doi: 10.1016/j.eswa.2022.117553. Epub 2022 May 20.
9
A Semisupervised Majority Weighted Vote Antiphishing Attacks IDS for the Education Industry.面向教育行业的半监督多数加权投票反网络钓鱼攻击 IDS。
Comput Intell Neurosci. 2022 Mar 31;2022:7402085. doi: 10.1155/2022/7402085. eCollection 2022.
10
A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks.机器学习和深度学习模型在移动网络电子信息安全中的系统评价
Sensors (Basel). 2022 Mar 4;22(5):2017. doi: 10.3390/s22052017.