• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用持续学习进行终身网络钓鱼攻击检测。

Life-long phishing attack detection using continual learning.

机构信息

Department of Computer Science, Information Technology University, Lahore, 54000, Pakistan.

出版信息

Sci Rep. 2023 Jul 17;13(1):11488. doi: 10.1038/s41598-023-37552-9.

DOI:10.1038/s41598-023-37552-9
PMID:37460588
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10352299/
Abstract

Phishing is an identity theft that employs social engineering methods to get confidential data from unwary users. A phisher frequently attempts to trick the victim into clicking a URL that leads to a malicious website. Many phishing attack victims lose their credentials and digital assets daily. This study demonstrates how the performance of traditional machine learning (ML)-based phishing detection models deteriorates over time. This failure is due to drastic changes in feature distributions caused by new phishing techniques and technological evolution over time. This paper explores continual learning (CL) techniques for sustained phishing detection performance over time. To demonstrate this behavior, we collect phishing and benign samples for three consecutive years from 2018 to 2020 and divide them into six datasets to evaluate traditional ML and proposed CL algorithms. We train a vanilla neural network (VNN) model in the CL fashion using deep feature embedding of HTML contents. We compare the proposed CL algorithms with the VNN model trained from scratch and with transfer learning (TL). We show that CL algorithms maintain accuracy over time with a tolerable deterioration of 2.45%. In contrast, VNN and TL-based models' performance deteriorates by over 20.65% and 8%, respectively.

摘要

网络钓鱼是一种身份盗窃,它采用社会工程学方法从毫无戒心的用户那里获取机密数据。网络钓鱼者通常试图欺骗受害者点击一个链接,该链接将他们引导至恶意网站。许多网络钓鱼攻击的受害者每天都会失去他们的凭证和数字资产。本研究表明,传统基于机器学习 (ML) 的网络钓鱼检测模型的性能随着时间的推移而恶化。这种失败是由于随着时间的推移,新的网络钓鱼技术和技术演变导致特征分布发生了急剧变化。本文探讨了持续学习 (CL) 技术,以实现随着时间的推移持续的网络钓鱼检测性能。为了证明这种行为,我们从 2018 年到 2020 年连续三年收集网络钓鱼和良性样本,并将它们分为六个数据集,以评估传统的 ML 和提出的 CL 算法。我们以 CL 方式使用 HTML 内容的深度特征嵌入来训练香草神经网络 (VNN) 模型。我们将提出的 CL 算法与从头开始训练的 VNN 模型和迁移学习 (TL) 进行比较。我们表明,CL 算法可以随着时间的推移保持准确性,而可容忍的恶化率为 2.45%。相比之下,VNN 和基于 TL 的模型的性能分别恶化了 20.65%和 8%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/bf7564322095/41598_2023_37552_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/1037178a0aab/41598_2023_37552_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/75b414fa21b2/41598_2023_37552_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/5b04c1a8c803/41598_2023_37552_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/5ff60d14e6b0/41598_2023_37552_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/e17348b21d79/41598_2023_37552_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/ce9211a517a9/41598_2023_37552_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/e32f9bf56d4d/41598_2023_37552_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/f2d2015166b5/41598_2023_37552_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/3e598c84f379/41598_2023_37552_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/9535b0765392/41598_2023_37552_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/d02b7f4ded01/41598_2023_37552_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/bf7564322095/41598_2023_37552_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/1037178a0aab/41598_2023_37552_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/75b414fa21b2/41598_2023_37552_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/5b04c1a8c803/41598_2023_37552_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/5ff60d14e6b0/41598_2023_37552_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/e17348b21d79/41598_2023_37552_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/ce9211a517a9/41598_2023_37552_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/e32f9bf56d4d/41598_2023_37552_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/f2d2015166b5/41598_2023_37552_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/3e598c84f379/41598_2023_37552_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/9535b0765392/41598_2023_37552_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/d02b7f4ded01/41598_2023_37552_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cba4/10352299/bf7564322095/41598_2023_37552_Fig12_HTML.jpg

相似文献

1
Life-long phishing attack detection using continual learning.利用持续学习进行终身网络钓鱼攻击检测。
Sci Rep. 2023 Jul 17;13(1):11488. doi: 10.1038/s41598-023-37552-9.
2
Applications of deep learning for phishing detection: a systematic literature review.深度学习在网络钓鱼检测中的应用:一项系统的文献综述。
Knowl Inf Syst. 2022;64(6):1457-1500. doi: 10.1007/s10115-022-01672-x. Epub 2022 May 23.
3
Detecting phishing websites using machine learning technique.利用机器学习技术检测钓鱼网站。
PLoS One. 2021 Oct 11;16(10):e0258361. doi: 10.1371/journal.pone.0258361. eCollection 2021.
4
Comparative evaluation of machine learning algorithms for phishing site detection.用于网络钓鱼网站检测的机器学习算法的比较评估。
PeerJ Comput Sci. 2024 Jun 24;10:e2131. doi: 10.7717/peerj-cs.2131. eCollection 2024.
5
A hybrid DNN-LSTM model for detecting phishing URLs.一种用于检测网络钓鱼网址的深度神经网络与长短期记忆网络混合模型。
Neural Comput Appl. 2023;35(7):4957-4973. doi: 10.1007/s00521-021-06401-z. Epub 2021 Aug 8.
6
An intelligent cyber security phishing detection system using deep learning techniques.一种使用深度学习技术的智能网络安全网络钓鱼检测系统。
Cluster Comput. 2022;25(6):3819-3828. doi: 10.1007/s10586-022-03604-4. Epub 2022 May 14.
7
A comprehensive survey of AI-enabled phishing attacks detection techniques.对人工智能驱动的网络钓鱼攻击检测技术的全面调查。
Telecommun Syst. 2021;76(1):139-154. doi: 10.1007/s11235-020-00733-2. Epub 2020 Oct 23.
8
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.一种使用机器学习的诱人广告网络钓鱼攻击检测混合方法。
Sensors (Basel). 2023 Sep 25;23(19):8070. doi: 10.3390/s23198070.
9
A Deep-Learning-Driven Light-Weight Phishing Detection Sensor.一种基于深度学习的轻量级钓鱼检测传感器。
Sensors (Basel). 2019 Sep 30;19(19):4258. doi: 10.3390/s19194258.
10
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.基于深度卷积神经网络和随机森林集成学习的钓鱼网站检测。
Sensors (Basel). 2021 Dec 10;21(24):8281. doi: 10.3390/s21248281.

引用本文的文献

1
Enhancing phishing detection with dynamic optimization and character-level deep learning in cloud environments.在云环境中通过动态优化和字符级深度学习增强网络钓鱼检测
PeerJ Comput Sci. 2025 May 19;11:e2640. doi: 10.7717/peerj-cs.2640. eCollection 2025.

本文引用的文献

1
An effective detection approach for phishing websites using URL and HTML features.一种利用 URL 和 HTML 特征的有效钓鱼网站检测方法。
Sci Rep. 2022 May 25;12(1):8842. doi: 10.1038/s41598-022-10841-5.
2
A Continual Learning Survey: Defying Forgetting in Classification Tasks.持续学习调查:在分类任务中对抗遗忘
IEEE Trans Pattern Anal Mach Intell. 2022 Jul;44(7):3366-3385. doi: 10.1109/TPAMI.2021.3057446. Epub 2022 Jun 3.
3
A Deep-Learning-Driven Light-Weight Phishing Detection Sensor.一种基于深度学习的轻量级钓鱼检测传感器。
Sensors (Basel). 2019 Sep 30;19(19):4258. doi: 10.3390/s19194258.
4
Learning without Forgetting.学过不忘。
IEEE Trans Pattern Anal Mach Intell. 2018 Dec;40(12):2935-2947. doi: 10.1109/TPAMI.2017.2773081. Epub 2017 Nov 14.
5
Overcoming catastrophic forgetting in neural networks.克服神经网络中的灾难性遗忘。
Proc Natl Acad Sci U S A. 2017 Mar 28;114(13):3521-3526. doi: 10.1073/pnas.1611835114. Epub 2017 Mar 14.