School of Computer Science and Informatics, De Montfort University, The Gateway, Leicester LE1 9BH, UK.
Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Parit Raja 86400, Malaysia.
Sensors (Basel). 2023 Apr 26;23(9):4284. doi: 10.3390/s23094284.
Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users' confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraudulent attempts. Internet scammers often use phishing attacks, which have no boundaries, since they could exceed hijacking conventional cyber ecosystems to hack intelligent systems, which emerged recently for the use within smart cities. This paper therefore develops a real-time framework inspired by the honeybee defense mechanism in nature for filtering phishing website attacks in smart cities. In particular, the proposed framework filters phishing websites through three main phases of investigation: PhishTank-Match (PM), Undesirable-Absent (UA), and Desirable-Present (DP) investigation phases. The PM phase is used at first in order to check whether the requested URL is listed in the blacklist of the PhishTank database. On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. The obtained results show that the proposed framework is deployable and capable of filtering various types of phishing website by maintaining a low rate of false alarms.
网络诈骗是一种欺诈性的尝试,旨在诱使用户透露其凭证或将其连接重定向到虚假网页,而不是实际的网页。这些欺诈性尝试的主要目标是用户的机密信息,如用户名、密码和财务账户号码。网络骗子经常使用无边界的网络钓鱼攻击,因为它们可以超越劫持传统网络生态系统来攻击最近为智能城市使用而出现的智能系统。因此,本文提出了一个受自然界蜜蜂防御机制启发的实时框架,用于过滤智能城市中的网络钓鱼网站攻击。特别是,该框架通过三个主要的调查阶段过滤网络钓鱼网站:PhishTank-Match (PM)、不可取的缺失 (UA)和可取的存在 (DP)调查阶段。首先使用 PM 阶段来检查请求的 URL 是否列在 PhishTank 数据库的黑名单中。另一方面,UA 阶段用于调查和检查请求网站的统一资源定位器 (URL) 中是否缺少不良符号。最后,DP 阶段作为另一个调查级别,用于检查请求的 URL 是否存在于可取的白名单中。所得结果表明,该框架是可部署的,并能够通过保持低误报率来过滤各种类型的网络钓鱼网站。