• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种使用新型OptSHQCNN方法进行高级网络钓鱼检测的双阶段深度学习框架。

A dual-phase deep learning framework for advanced phishing detection using the novel OptSHQCNN approach.

作者信息

Meda Srikanth, Srinivas Vangipuram Sesha, Rao Killi Chandra Bhushana, Ramesh Repudi, Yamarthi Narasimha Rao

机构信息

Department of Computer Science and Engineering, RVR&JC College of Engineering, Guntur, Andhra Pradesh, India.

Department of Information Technology, RVR&JC College of Engineering, Guntur, Andhra Pradesh, India.

出版信息

PeerJ Comput Sci. 2025 Jul 17;11:e3014. doi: 10.7717/peerj-cs.3014. eCollection 2025.

DOI:10.7717/peerj-cs.3014
PMID:40989319
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12453812/
Abstract

BACKGROUND

Phishing attacks are now regarded as one of the most prevalent cyberattacks that often compromise the security of different communication and internet networks. Phishing websites are created with the goal of generating cyber threats in order to ascertain the user's financial information. Fake websites are frequently created and circulated online, which results in the loss of essential user assets. Phishing websites can result in monetary loss, intellectual property theft, damage to one's reputation, and disruption of regular business activities. Over the past decade, a number of anti-phishing tactics have been proposed to detect and reduce these attempts. They are still imprecise and ineffective, though. Deep Learning (DL), which can precisely learn the intrinsic features of the websites and recognize phishing websites, is one of the innovative techniques utilized to solve this issue.

METHODS

In this study, we proposed a novel OptSHQCNN phishing detection method. Pre-deployment and post-deployment are the two phases of the proposed methodology. The dataset undergoes preprocessing in the pre-deployment phase, which includes data balancing, and handling invalid features, irrelevant features, and missing values. The convolutional block attention module (CBAM) then extracts the main characteristics from web page code and linkages. The red kite optimization algorithm (RKOA) selects the significant key attributes in the third stage. The final phase involves classifying the data using the Shallow hybrid quantum-classical convolutional neural network (SHQCNN) model. To improve the effectiveness of the classification approach, the hyperparameters present in the SHQCNN model are fine-tuned using the shuffled shepherd optimization algorithm (SSOA).

RESULTS

In the post-deployment phase, the URL is encoded using Optimized Bidirectional Encoder Representations from Transformers (OptBERT), after which the features are extracted. The retrieved properties are fed into a trained classifier. Next, a prediction of "phishing" or "Legitimate" is produced by the classifier. With a maximum of above 99% accuracy, precision, recall, and F1-score, respectively, the investigation's findings showed that the suggested technique performed better than other popular phishing detection methods. The creation of a security plugin for clients, browsers, and other instant messaging applications that operate on network edges, PCs, smartphones, and other personal terminals can be aided by these findings.

摘要

背景

网络钓鱼攻击如今被视为最普遍的网络攻击之一,常常危及不同通信和互联网网络的安全。创建网络钓鱼网站的目的是制造网络威胁,以获取用户的财务信息。虚假网站经常在网上创建和传播,这导致用户重要资产的损失。网络钓鱼网站可能导致金钱损失、知识产权盗窃、声誉受损以及正常商业活动中断。在过去十年中,已经提出了许多反网络钓鱼策略来检测和减少这些攻击。然而,它们仍然不够精确且效果不佳。深度学习(DL)是用于解决此问题的创新技术之一,它可以精确地学习网站的内在特征并识别网络钓鱼网站。

方法

在本研究中,我们提出了一种新颖的OptSHQCNN网络钓鱼检测方法。所提出的方法有预部署和后部署两个阶段。数据集在预部署阶段进行预处理,包括数据平衡以及处理无效特征、无关特征和缺失值。然后,卷积块注意力模块(CBAM)从网页代码和链接中提取主要特征。第三阶段使用红风筝优化算法(RKOA)选择重要的关键属性。最后阶段使用浅混合量子 - 经典卷积神经网络(SHQCNN)模型对数据进行分类。为了提高分类方法的有效性,使用洗牌牧羊人优化算法(SSOA)对SHQCNN模型中的超参数进行微调。

结果

在后部署阶段,使用优化的基于变换器的双向编码器表示(OptBERT)对URL进行编码,然后提取特征。将检索到的属性输入到经过训练的分类器中。接下来,分类器会做出“网络钓鱼”或“合法”的预测。调查结果显示,所建议的技术分别以最高超过99%的准确率、精确率、召回率和F1分数表现优于其他流行的网络钓鱼检测方法。这些发现有助于为在网络边缘、个人电脑、智能手机和其他个人终端上运行的客户端、浏览器及其他即时通讯应用创建安全插件。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/7be25d141dd9/peerj-cs-11-3014-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/51640f9aef81/peerj-cs-11-3014-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/220b544b803a/peerj-cs-11-3014-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/1b3707d16dc5/peerj-cs-11-3014-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/3459efaf433e/peerj-cs-11-3014-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/d9002a6482f1/peerj-cs-11-3014-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/da05df804b8e/peerj-cs-11-3014-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/b6aa90795300/peerj-cs-11-3014-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/d73849bce8b9/peerj-cs-11-3014-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/7a5cf694d6dc/peerj-cs-11-3014-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/2aa7805a3f69/peerj-cs-11-3014-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/a64eb27e899c/peerj-cs-11-3014-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/84655c74d76a/peerj-cs-11-3014-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/cbddaabf7ec9/peerj-cs-11-3014-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/4cce76474788/peerj-cs-11-3014-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/ff23ed8ed2b6/peerj-cs-11-3014-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/bbeda2b4e564/peerj-cs-11-3014-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/eff15975988c/peerj-cs-11-3014-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/7f05a22fd86f/peerj-cs-11-3014-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/7be25d141dd9/peerj-cs-11-3014-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/51640f9aef81/peerj-cs-11-3014-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/220b544b803a/peerj-cs-11-3014-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/1b3707d16dc5/peerj-cs-11-3014-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/3459efaf433e/peerj-cs-11-3014-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/d9002a6482f1/peerj-cs-11-3014-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/da05df804b8e/peerj-cs-11-3014-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/b6aa90795300/peerj-cs-11-3014-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/d73849bce8b9/peerj-cs-11-3014-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/7a5cf694d6dc/peerj-cs-11-3014-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/2aa7805a3f69/peerj-cs-11-3014-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/a64eb27e899c/peerj-cs-11-3014-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/84655c74d76a/peerj-cs-11-3014-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/cbddaabf7ec9/peerj-cs-11-3014-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/4cce76474788/peerj-cs-11-3014-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/ff23ed8ed2b6/peerj-cs-11-3014-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/bbeda2b4e564/peerj-cs-11-3014-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/eff15975988c/peerj-cs-11-3014-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/7f05a22fd86f/peerj-cs-11-3014-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cf65/12453812/7be25d141dd9/peerj-cs-11-3014-g019.jpg

相似文献

1
A dual-phase deep learning framework for advanced phishing detection using the novel OptSHQCNN approach.一种使用新型OptSHQCNN方法进行高级网络钓鱼检测的双阶段深度学习框架。
PeerJ Comput Sci. 2025 Jul 17;11:e3014. doi: 10.7717/peerj-cs.3014. eCollection 2025.
2
Prescription of Controlled Substances: Benefits and Risks管制药品的处方:益处与风险
3
Vesicoureteral Reflux膀胱输尿管反流
4
Shoulder Arthrogram肩关节造影
5
Short-Term Memory Impairment短期记忆障碍
6
Mid Forehead Brow Lift额中眉提升术
7
Sexual Harassment and Prevention Training性骚扰与预防培训
8
Enhancing phishing detection with dynamic optimization and character-level deep learning in cloud environments.在云环境中通过动态优化和字符级深度学习增强网络钓鱼检测
PeerJ Comput Sci. 2025 May 19;11:e2640. doi: 10.7717/peerj-cs.2640. eCollection 2025.
9
Anterior Approach Total Ankle Arthroplasty with Patient-Specific Cut Guides.使用患者特异性截骨导向器的前路全踝关节置换术。
JBJS Essent Surg Tech. 2025 Aug 15;15(3). doi: 10.2106/JBJS.ST.23.00027. eCollection 2025 Jul-Sep.
10
Neuro-XAI: Explainable deep learning framework based on deeplabV3+ and bayesian optimization for segmentation and classification of brain tumor in MRI scans.Neuro-XAI:基于deeplabV3+和贝叶斯优化的可解释深度学习框架,用于磁共振成像扫描中脑肿瘤的分割和分类。
J Neurosci Methods. 2024 Oct;410:110247. doi: 10.1016/j.jneumeth.2024.110247. Epub 2024 Aug 10.

本文引用的文献

1
Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques.使用机器学习技术对基于混合特征的网络钓鱼网站进行检测建模
Ann Data Sci. 2022 Mar 21:1-26. doi: 10.1007/s40745-022-00379-8.
2
Cloud-based email phishing attack using machine and deep learning algorithm.基于云的使用机器学习和深度学习算法的电子邮件网络钓鱼攻击。
Complex Intell Systems. 2023;9(3):3043-3070. doi: 10.1007/s40747-022-00760-3. Epub 2022 Jun 2.
3
A hybrid DNN-LSTM model for detecting phishing URLs.一种用于检测网络钓鱼网址的深度神经网络与长短期记忆网络混合模型。
Neural Comput Appl. 2023;35(7):4957-4973. doi: 10.1007/s00521-021-06401-z. Epub 2021 Aug 8.