• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于云的使用机器学习和深度学习算法的电子邮件网络钓鱼攻击。

Cloud-based email phishing attack using machine and deep learning algorithm.

作者信息

Butt Umer Ahmed, Amin Rashid, Aldabbas Hamza, Mohan Senthilkumar, Alouffi Bader, Ahmadian Ali

机构信息

Department of Computer Science, University of Engineering and Technology, Taxila, Pakistan.

Department of Computer Science, University of Chakwal, Chakwal, Pakistan.

出版信息

Complex Intell Systems. 2023;9(3):3043-3070. doi: 10.1007/s40747-022-00760-3. Epub 2022 Jun 2.

DOI:10.1007/s40747-022-00760-3
PMID:35668732
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9160858/
Abstract

Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive data for individuals or groups. Financial data, credit reports, and other sensitive data are often sent via the Internet. Phishing is a fraudster's technique used to get sensitive data from users by seeming to come from trusted sources. The sender can persuade you to give secret data by misdirecting in a phished email. The main problem is email phishing attacks while sending and receiving the email. The attacker sends spam data using email and receives your data when you open and read the email. In recent years, it has been a big problem for everyone. This paper uses different legitimate and phishing data sizes, detects new emails, and uses different features and algorithms for classification. A modified dataset is created after measuring the existing approaches. We created a feature extracted comma-separated values (CSV) file and label file, applied the support vector machine (SVM), Naive Bayes (NB), and long short-term memory (LSTM) algorithm. This experimentation considers the recognition of a phished email as a classification issue. According to the comparison and implementation, SVM, NB and LSTM performance is better and more accurate to detect email phishing attacks. The classification of email attacks using SVM, NB, and LSTM classifiers achieve the highest accuracy of 99.62%, 97% and 98%, respectively.

摘要

云计算是指个人计算机系统资产(特别是数据存储和处理能力)的按需可用性,无需客户输入。电子邮件通常用于个人或群体发送和接收数据。财务数据、信用报告和其他敏感数据经常通过互联网发送。网络钓鱼是欺诈者使用的一种技术,通过看似来自可信来源来从用户那里获取敏感数据。发送者可以通过在网络钓鱼电子邮件中误导来诱使你提供机密数据。主要问题是在发送和接收电子邮件时的电子邮件网络钓鱼攻击。攻击者使用电子邮件发送垃圾邮件数据,并在你打开和阅读电子邮件时接收你的数据。近年来,这对每个人来说都是一个大问题。本文使用不同的合法和网络钓鱼数据大小,检测新电子邮件,并使用不同的特征和算法进行分类。在衡量现有方法之后创建了一个修改后的数据集。我们创建了一个提取特征的逗号分隔值(CSV)文件和标签文件,应用了支持向量机(SVM)、朴素贝叶斯(NB)和长短期记忆(LSTM)算法。 本实验将网络钓鱼电子邮件的识别视为一个分类问题。根据比较和实施情况,SVM、NB和LSTM的性能更好,在检测电子邮件网络钓鱼攻击方面更准确。使用SVM、NB和LSTM分类器对电子邮件攻击进行分类时,准确率分别达到99.62%、97%和98%的最高水平。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/56dc6b948c35/40747_2022_760_Fig20_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/146e48562473/40747_2022_760_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/2bfe30bb90b4/40747_2022_760_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/f7fdc3f139b3/40747_2022_760_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/3383e9afbaae/40747_2022_760_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/4f5df3f6d690/40747_2022_760_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/2d7c9a260709/40747_2022_760_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/c7284f00385d/40747_2022_760_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/84458ebb46a9/40747_2022_760_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/0c65babd1954/40747_2022_760_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/2adf969be6d0/40747_2022_760_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/ee1686441ac7/40747_2022_760_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/b1d43dd0d0eb/40747_2022_760_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/bf82b91e4647/40747_2022_760_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/525de8354acd/40747_2022_760_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/8f82ff607092/40747_2022_760_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/7a6f38b93a0e/40747_2022_760_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/e304bbb30cc3/40747_2022_760_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/287744985bf2/40747_2022_760_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/762d985cca17/40747_2022_760_Fig19_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/56dc6b948c35/40747_2022_760_Fig20_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/146e48562473/40747_2022_760_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/2bfe30bb90b4/40747_2022_760_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/f7fdc3f139b3/40747_2022_760_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/3383e9afbaae/40747_2022_760_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/4f5df3f6d690/40747_2022_760_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/2d7c9a260709/40747_2022_760_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/c7284f00385d/40747_2022_760_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/84458ebb46a9/40747_2022_760_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/0c65babd1954/40747_2022_760_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/2adf969be6d0/40747_2022_760_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/ee1686441ac7/40747_2022_760_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/b1d43dd0d0eb/40747_2022_760_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/bf82b91e4647/40747_2022_760_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/525de8354acd/40747_2022_760_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/8f82ff607092/40747_2022_760_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/7a6f38b93a0e/40747_2022_760_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/e304bbb30cc3/40747_2022_760_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/287744985bf2/40747_2022_760_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/762d985cca17/40747_2022_760_Fig19_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6279/9160858/56dc6b948c35/40747_2022_760_Fig20_HTML.jpg

相似文献

1
Cloud-based email phishing attack using machine and deep learning algorithm.基于云的使用机器学习和深度学习算法的电子邮件网络钓鱼攻击。
Complex Intell Systems. 2023;9(3):3043-3070. doi: 10.1007/s40747-022-00760-3. Epub 2022 Jun 2.
2
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.一种使用机器学习的诱人广告网络钓鱼攻击检测混合方法。
Sensors (Basel). 2023 Sep 25;23(19):8070. doi: 10.3390/s23198070.
3
A comprehensive survey of AI-enabled phishing attacks detection techniques.对人工智能驱动的网络钓鱼攻击检测技术的全面调查。
Telecommun Syst. 2021;76(1):139-154. doi: 10.1007/s11235-020-00733-2. Epub 2020 Oct 23.
4
An intelligent cyber security phishing detection system using deep learning techniques.一种使用深度学习技术的智能网络安全网络钓鱼检测系统。
Cluster Comput. 2022;25(6):3819-3828. doi: 10.1007/s10586-022-03604-4. Epub 2022 May 14.
5
Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models.推进网络钓鱼电子邮件检测:深度学习模型的比较研究
Sensors (Basel). 2024 Mar 24;24(7):2077. doi: 10.3390/s24072077.
6
A hybrid DNN-LSTM model for detecting phishing URLs.一种用于检测网络钓鱼网址的深度神经网络与长短期记忆网络混合模型。
Neural Comput Appl. 2023;35(7):4957-4973. doi: 10.1007/s00521-021-06401-z. Epub 2021 Aug 8.
7
Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.基于人工智能算法的经济可持续性否认攻击检测系统:云计算环境。
Sensors (Basel). 2022 Jun 21;22(13):4685. doi: 10.3390/s22134685.
8
So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility.这么多网络钓鱼,时间太少了:探索电子邮件任务因素和网络钓鱼易感性。
Hum Factors. 2022 Dec;64(8):1379-1403. doi: 10.1177/0018720821999174. Epub 2021 Apr 9.
9
Evaluation of Federated Learning in Phishing Email Detection.联邦学习在钓鱼邮件检测中的评估。
Sensors (Basel). 2023 Apr 27;23(9):4346. doi: 10.3390/s23094346.
10
How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society.我们在检测网络钓鱼攻击方面有多出色?调查不断演变的网络钓鱼攻击电子邮件及其持续成功欺骗社会的原因。
SN Comput Sci. 2022;3(2):170. doi: 10.1007/s42979-022-01069-1. Epub 2022 Feb 23.

引用本文的文献

1
Comparative study of ten machine learning algorithms for short-term forecasting in gas warning systems.气体预警系统中十种机器学习算法用于短期预测的比较研究
Sci Rep. 2024 Sep 20;14(1):21969. doi: 10.1038/s41598-024-67283-4.
2
Anesthesia decision analysis using a cloud-based big data platform.基于云的大数据平台的麻醉决策分析。
Eur J Med Res. 2024 Mar 25;29(1):201. doi: 10.1186/s40001-024-01764-0.
3
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.一种使用机器学习的诱人广告网络钓鱼攻击检测混合方法。
Sensors (Basel). 2023 Sep 25;23(19):8070. doi: 10.3390/s23198070.