• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种使用机器学习的诱人广告网络钓鱼攻击检测混合方法。

A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.

作者信息

Shaukat Muhammad Waqas, Amin Rashid, Muslam Muhana Magboul Ali, Alshehri Asma Hassan, Xie Jiang

机构信息

Department of Computer Science, University of Engineering and Technology, Taxila 47050, Pakistan.

Department of Computer Science, University of Chakwal, Chakwal 48800, Pakistan.

出版信息

Sensors (Basel). 2023 Sep 25;23(19):8070. doi: 10.3390/s23198070.

DOI:10.3390/s23198070
PMID:37836902
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10575062/
Abstract

Phishing attacks are evolving with more sophisticated techniques, posing significant threats. Considering the potential of machine-learning-based approaches, our research presents a similar modern approach for web phishing detection by applying powerful machine learning algorithms. An efficient layered classification model is proposed to detect websites based on their URL structure, text, and image features. Previously, similar studies have used machine learning techniques for URL features with a limited dataset. In our research, we have used a large dataset of 20,000 website URLs, and 22 salient features from each URL are extracted to prepare a comprehensive dataset. Along with this, another dataset containing website text is also prepared for NLP-based text evaluation. It is seen that many phishing websites contain text as images, and to handle this, the text from images is extracted to classify it as spam or legitimate. The experimental evaluation demonstrated efficient and accurate phishing detection. Our layered classification model uses support vector machine (SVM), XGBoost, random forest, multilayer perceptron, linear regression, decision tree, naïve Bayes, and SVC algorithms. The performance evaluation revealed that the XGBoost algorithm outperformed other applied models with maximum accuracy and precision of 94% in the training phase and 91% in the testing phase. Multilayer perceptron also worked well with an accuracy of 91% in the testing phase. The accuracy results for random forest and decision tree were 91% and 90%, respectively. Logistic regression and SVM algorithms were used in the text-based classification, and the accuracy was found to be 87% and 88%, respectively. With these precision values, the models classified phishing and legitimate websites very well, based on URL, text, and image features. This research contributes to early detection of sophisticated phishing attacks, enhancing internet user security.

摘要

网络钓鱼攻击正随着更复杂的技术不断演变,构成了重大威胁。考虑到基于机器学习方法的潜力,我们的研究提出了一种类似的现代方法,通过应用强大的机器学习算法来检测网络钓鱼。我们提出了一种高效的分层分类模型,用于基于网站的URL结构、文本和图像特征来检测网站。此前,类似研究在有限数据集上使用机器学习技术处理URL特征。在我们的研究中,我们使用了一个包含20000个网站URL的大型数据集,并从每个URL中提取了22个显著特征,以准备一个综合数据集。与此同时,还准备了另一个包含网站文本的数据集,用于基于自然语言处理的文本评估。可以看到,许多网络钓鱼网站将文本以图像形式呈现,为处理这一情况,我们提取图像中的文本以将其分类为垃圾邮件或合法内容。实验评估表明该方法在检测网络钓鱼方面高效且准确。我们的分层分类模型使用了支持向量机(SVM)、XGBoost、随机森林、多层感知器、线性回归、决策树、朴素贝叶斯和支持向量分类(SVC)算法。性能评估显示,XGBoost算法在训练阶段的准确率和精确率最高,分别为94%,在测试阶段为91%,优于其他应用模型。多层感知器在测试阶段的准确率也达到了91%,效果良好。随机森林和决策树的准确率分别为91%和90%。逻辑回归和SVM算法用于基于文本的分类,准确率分别为87%和88%。基于这些精确值,这些模型基于URL、文本和图像特征,能够很好地对网络钓鱼网站和合法网站进行分类。这项研究有助于早期检测复杂的网络钓鱼攻击,增强互联网用户的安全性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/1a828f730e44/sensors-23-08070-g022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/c446e172cadb/sensors-23-08070-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/d118aba7bf95/sensors-23-08070-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/4f9607acf322/sensors-23-08070-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/96ac3d29807a/sensors-23-08070-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/05c22a7be8b1/sensors-23-08070-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/8faa5fa329ff/sensors-23-08070-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/79e317abc9d3/sensors-23-08070-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/b3fa3b529404/sensors-23-08070-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/2177ef4e2905/sensors-23-08070-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/f539e3cfd6b6/sensors-23-08070-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/8711c2fb1620/sensors-23-08070-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/f71db61bbe09/sensors-23-08070-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/bb8dc53fc2b0/sensors-23-08070-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/a06513ef9c26/sensors-23-08070-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/8e2d466ce2f8/sensors-23-08070-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/cd0afa908c84/sensors-23-08070-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/dde0fdbc7e6d/sensors-23-08070-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/c75bfb780d04/sensors-23-08070-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/a21eb6a1393b/sensors-23-08070-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/aa1cc2ab2846/sensors-23-08070-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/61612e308313/sensors-23-08070-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/1a828f730e44/sensors-23-08070-g022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/c446e172cadb/sensors-23-08070-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/d118aba7bf95/sensors-23-08070-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/4f9607acf322/sensors-23-08070-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/96ac3d29807a/sensors-23-08070-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/05c22a7be8b1/sensors-23-08070-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/8faa5fa329ff/sensors-23-08070-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/79e317abc9d3/sensors-23-08070-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/b3fa3b529404/sensors-23-08070-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/2177ef4e2905/sensors-23-08070-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/f539e3cfd6b6/sensors-23-08070-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/8711c2fb1620/sensors-23-08070-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/f71db61bbe09/sensors-23-08070-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/bb8dc53fc2b0/sensors-23-08070-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/a06513ef9c26/sensors-23-08070-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/8e2d466ce2f8/sensors-23-08070-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/cd0afa908c84/sensors-23-08070-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/dde0fdbc7e6d/sensors-23-08070-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/c75bfb780d04/sensors-23-08070-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/a21eb6a1393b/sensors-23-08070-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/aa1cc2ab2846/sensors-23-08070-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/61612e308313/sensors-23-08070-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2651/10575062/1a828f730e44/sensors-23-08070-g022.jpg

相似文献

1
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.一种使用机器学习的诱人广告网络钓鱼攻击检测混合方法。
Sensors (Basel). 2023 Sep 25;23(19):8070. doi: 10.3390/s23198070.
2
A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators.基于深度学习的现代安全中基于统一资源定位器的网络钓鱼检测创新技术。
Sensors (Basel). 2023 Apr 30;23(9):4403. doi: 10.3390/s23094403.
3
Improving the phishing website detection using empirical analysis of Function Tree and its variants.通过对功能树及其变体进行实证分析来改进网络钓鱼网站检测
Heliyon. 2021 Jun 29;7(7):e07437. doi: 10.1016/j.heliyon.2021.e07437. eCollection 2021 Jul.
4
A comprehensive survey of AI-enabled phishing attacks detection techniques.对人工智能驱动的网络钓鱼攻击检测技术的全面调查。
Telecommun Syst. 2021;76(1):139-154. doi: 10.1007/s11235-020-00733-2. Epub 2020 Oct 23.
5
Cloud-based email phishing attack using machine and deep learning algorithm.基于云的使用机器学习和深度学习算法的电子邮件网络钓鱼攻击。
Complex Intell Systems. 2023;9(3):3043-3070. doi: 10.1007/s40747-022-00760-3. Epub 2022 Jun 2.
6
Comparative evaluation of machine learning algorithms for phishing site detection.用于网络钓鱼网站检测的机器学习算法的比较评估。
PeerJ Comput Sci. 2024 Jun 24;10:e2131. doi: 10.7717/peerj-cs.2131. eCollection 2024.
7
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.基于深度卷积神经网络和随机森林集成学习的钓鱼网站检测。
Sensors (Basel). 2021 Dec 10;21(24):8281. doi: 10.3390/s21248281.
8
Detecting phishing websites using machine learning technique.利用机器学习技术检测钓鱼网站。
PLoS One. 2021 Oct 11;16(10):e0258361. doi: 10.1371/journal.pone.0258361. eCollection 2021.
9
An intelligent identification and classification system for malicious uniform resource locators (URLs).一种针对恶意统一资源定位符(URL)的智能识别与分类系统。
Neural Comput Appl. 2023 Apr 20:1-17. doi: 10.1007/s00521-023-08592-z.
10
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.基于网络威胁情报的集成学习恶意 URL 检测模型。
Sensors (Basel). 2022 Apr 28;22(9):3373. doi: 10.3390/s22093373.

本文引用的文献

1
Cloud-based email phishing attack using machine and deep learning algorithm.基于云的使用机器学习和深度学习算法的电子邮件网络钓鱼攻击。
Complex Intell Systems. 2023;9(3):3043-3070. doi: 10.1007/s40747-022-00760-3. Epub 2022 Jun 2.
2
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.基于深度卷积神经网络和随机森林集成学习的钓鱼网站检测。
Sensors (Basel). 2021 Dec 10;21(24):8281. doi: 10.3390/s21248281.