• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于识别跨网络和电子邮件平台的网络钓鱼威胁的启发式机器学习方法。

Heuristic machine learning approaches for identifying phishing threats across web and email platforms.

作者信息

Jayaprakash Ramprasath, Natarajan Krishnaraj, Daniel J Alfred, Chinnappan Chandru Vignesh, Giri Jayant, Qin Hong, Mallik Saurav

机构信息

Department of Information Technology, Dr. Mahalingam College of Engineering and Technology, Pollachi, India.

School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.

出版信息

Front Artif Intell. 2024 Oct 21;7:1414122. doi: 10.3389/frai.2024.1414122. eCollection 2024.

DOI:10.3389/frai.2024.1414122
PMID:39498387
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11532189/
Abstract

Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat. Without a doubt, phishing is one of the rising concerns that leads to stealing vital information such as passwords, security codes, and personal data from any target node through communication hijacking techniques. In addition, phishing attacks include delivering false messages that originate from a trusted source. Moreover, a phishing attack aims to get the victim to run malicious programs and reveal confidential data, such as bank credentials, one-time passwords, and user login credentials. The sole intention is to collect personal information through malicious program-based attempts embedded in URLs, emails, and website-based attempts. Notably, this proposed technique detects URL, email, and website-based phishing attacks, which will be beneficial and secure us from scam attempts. Subsequently, the data are pre-processed to identify phishing attacks using data cleaning, attribute selection, and attacks detected using machine learning techniques. Furthermore, the proposed techniques use heuristic-based machine learning to identify phishing attacks. Admittedly, 56 features are used to analyze URL phishing findings, and experimental results show that the proposed technique has a better accuracy of 97.2%. Above all, the proposed techniques for email phishing detection obtain a higher accuracy of 97.4%. In addition, the proposed technique for website phishing detection has a better accuracy of 98.1%, and 48 features are used for analysis.

摘要

在这个竞争激烈的世界中,先进技术时代让生活变得更加舒适。然而,也出现了一些有害技术构成威胁。毫无疑问,网络钓鱼是一个日益严重的问题,它通过通信劫持技术从任何目标节点窃取密码、安全码和个人数据等重要信息。此外,网络钓鱼攻击包括发送来自可信来源的虚假消息。而且,网络钓鱼攻击旨在诱使受害者运行恶意程序并泄露机密数据,如银行凭证、一次性密码和用户登录凭证。其唯一目的是通过嵌入在URL、电子邮件和基于网站的尝试中的基于恶意程序的手段来收集个人信息。值得注意的是,本文提出的技术可检测基于URL、电子邮件和网站的网络钓鱼攻击,这将对我们有益并使我们免受诈骗企图的侵害。随后,对数据进行预处理,通过数据清理、属性选择来识别网络钓鱼攻击,并使用机器学习技术检测攻击。此外,本文提出的技术使用基于启发式的机器学习来识别网络钓鱼攻击。诚然,使用56个特征来分析URL网络钓鱼结果,实验结果表明该技术具有97.2%的较高准确率。最重要的是,本文提出的电子邮件网络钓鱼检测技术获得了97.4%的更高准确率。此外,本文提出的网站网络钓鱼检测技术具有98.1%的较高准确率,并且使用48个特征进行分析。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/a7022957add5/frai-07-1414122-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/9197da20dfe5/frai-07-1414122-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/942c90018c7b/frai-07-1414122-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/e08de7ae7cdc/frai-07-1414122-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/81f922510181/frai-07-1414122-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/752f49c4f4b2/frai-07-1414122-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/27c03b685da9/frai-07-1414122-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/722edef36900/frai-07-1414122-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/5b5dd7bd6c81/frai-07-1414122-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/fe1a79ed9e82/frai-07-1414122-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/768cc982d70f/frai-07-1414122-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/9ee2bbe04bc4/frai-07-1414122-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/59031ceef995/frai-07-1414122-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/2ef49c171401/frai-07-1414122-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/48d0c4063936/frai-07-1414122-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/70d43e7ff1d8/frai-07-1414122-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/516078d97b7d/frai-07-1414122-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/7e05d40cd19b/frai-07-1414122-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/a7022957add5/frai-07-1414122-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/9197da20dfe5/frai-07-1414122-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/942c90018c7b/frai-07-1414122-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/e08de7ae7cdc/frai-07-1414122-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/81f922510181/frai-07-1414122-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/752f49c4f4b2/frai-07-1414122-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/27c03b685da9/frai-07-1414122-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/722edef36900/frai-07-1414122-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/5b5dd7bd6c81/frai-07-1414122-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/fe1a79ed9e82/frai-07-1414122-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/768cc982d70f/frai-07-1414122-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/9ee2bbe04bc4/frai-07-1414122-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/59031ceef995/frai-07-1414122-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/2ef49c171401/frai-07-1414122-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/48d0c4063936/frai-07-1414122-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/70d43e7ff1d8/frai-07-1414122-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/516078d97b7d/frai-07-1414122-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/7e05d40cd19b/frai-07-1414122-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2031/11532189/a7022957add5/frai-07-1414122-g018.jpg

相似文献

1
Heuristic machine learning approaches for identifying phishing threats across web and email platforms.用于识别跨网络和电子邮件平台的网络钓鱼威胁的启发式机器学习方法。
Front Artif Intell. 2024 Oct 21;7:1414122. doi: 10.3389/frai.2024.1414122. eCollection 2024.
2
A comprehensive survey of AI-enabled phishing attacks detection techniques.对人工智能驱动的网络钓鱼攻击检测技术的全面调查。
Telecommun Syst. 2021;76(1):139-154. doi: 10.1007/s11235-020-00733-2. Epub 2020 Oct 23.
3
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.一种使用机器学习的诱人广告网络钓鱼攻击检测混合方法。
Sensors (Basel). 2023 Sep 25;23(19):8070. doi: 10.3390/s23198070.
4
Comparative evaluation of machine learning algorithms for phishing site detection.用于网络钓鱼网站检测的机器学习算法的比较评估。
PeerJ Comput Sci. 2024 Jun 24;10:e2131. doi: 10.7717/peerj-cs.2131. eCollection 2024.
5
Detecting phishing websites using machine learning technique.利用机器学习技术检测钓鱼网站。
PLoS One. 2021 Oct 11;16(10):e0258361. doi: 10.1371/journal.pone.0258361. eCollection 2021.
6
Life-long phishing attack detection using continual learning.利用持续学习进行终身网络钓鱼攻击检测。
Sci Rep. 2023 Jul 17;13(1):11488. doi: 10.1038/s41598-023-37552-9.
7
Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis.利用序列和并行 ML 技术检测网络钓鱼 URL:比较分析。
Sensors (Basel). 2023 Mar 26;23(7):3467. doi: 10.3390/s23073467.
8
Cloud-based email phishing attack using machine and deep learning algorithm.基于云的使用机器学习和深度学习算法的电子邮件网络钓鱼攻击。
Complex Intell Systems. 2023;9(3):3043-3070. doi: 10.1007/s40747-022-00760-3. Epub 2022 Jun 2.
9
An intelligent cyber security phishing detection system using deep learning techniques.一种使用深度学习技术的智能网络安全网络钓鱼检测系统。
Cluster Comput. 2022;25(6):3819-3828. doi: 10.1007/s10586-022-03604-4. Epub 2022 May 14.
10
An intelligent identification and classification system for malicious uniform resource locators (URLs).一种针对恶意统一资源定位符(URL)的智能识别与分类系统。
Neural Comput Appl. 2023 Apr 20:1-17. doi: 10.1007/s00521-023-08592-z.

本文引用的文献

1
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.物联网的关键网络安全分析与未来研究方向:全面综述。
Sensors (Basel). 2023 Apr 19;23(8):4117. doi: 10.3390/s23084117.
2
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains.新冠疫情期间网络钓鱼的发展:对1100多个目标域名的分析
Comput Secur. 2023 May;128:103158. doi: 10.1016/j.cose.2023.103158. Epub 2023 Feb 25.
3
Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks.
个性化说服:量化鱼叉式网络钓鱼攻击中信息利用的易感性。
Appl Ergon. 2023 Apr;108:103908. doi: 10.1016/j.apergo.2022.103908. Epub 2022 Nov 17.
4
Datasets for phishing websites detection.用于网络钓鱼网站检测的数据集。
Data Brief. 2020 Oct 23;33:106438. doi: 10.1016/j.dib.2020.106438. eCollection 2020 Dec.