4.6 Article

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

A hybrid DNN-LSTM model for detecting phishing URLs

Alper Ozcan et al.

Summary: This study proposes a hybrid deep learning model that utilizes both character embedding and NLP feature extraction techniques for detecting phishing attacks. Experimental results show that the proposed model achieves superior performance in terms of accuracy metric.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Detecting phishing webpages via homology analysis of webpage structure

Jian Feng et al.

Summary: This article proposes a homology detection method based on webpage clustering according to structural similarity, which can effectively curb the proliferation of phishing webpages through analysis of phishing webpages belonging to the same family.

PEERJ COMPUTER SCIENCE (2022)

Article Computer Science, Hardware & Architecture

A novel phishing detection system using binary modified equilibrium optimizer for feature selection

Sachin Minocha et al.

Summary: This paper proposes a new phishing detection system using AV-BMEO and k-nearest neighbor classifier, which improves the accuracy and performance of phishing website detection through feature selection and classifier optimization.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Hardware & Architecture

Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques

Alaeddine Mihoub et al.

Summary: This paper investigates the detection of DoS/DDoS attacks in IoT using machine learning techniques. A new architecture is proposed, consisting of two components: DoS/DDoS detection and mitigation. The detection component provides fine-granularity detection, identifying the specific type of attack and packet type used. Evaluation on the Bot-IoT dataset shows promising results, with a Looking-Back-enabled Random Forest classifier achieving an accuracy of 99.81%.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Information Systems

MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest

Erzhou Zhu et al.

Summary: This research proposes a novel phishing detection model, MOE/RF, which utilizes the revised multi-objective evolution optimization algorithm and random forest. By focusing on accuracy and minimizing false detection, the MOE/RF model outperforms several existing methods.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Computer Science, Information Systems

Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study

Emilio Figueras-Martin et al.

Summary: This study analyzes the website connectivity, relationships, and content of a relatively unknown and less explored darknet, Freenet. The results show that Freenet has a large number of available websites, significant nodes in the network connectivity structure, and underage pornography as the predominant illegal content.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Article Computer Science, Artificial Intelligence

Phishing websites detection using a novel multipurpose dataset and web technologies features

Manuel Sanchez-Paniagua et al.

Summary: Phishing attacks are challenging cyberattacks that involve a large number of entities in online transactions and services. This study presents a methodology for detecting phishing websites in real scenarios using URL, HTML, and web technology features. The researchers also created a dataset of 134,000 verified samples for testing and comparison purposes.

EXPERT SYSTEMS WITH APPLICATIONS (2022)

Article Computer Science, Information Systems

Phishing URL Detection: A Real-Case Scenario Through Login URLs

Manuel Sanchez-Paniagua et al.

Summary: This study compares machine learning and deep learning techniques and presents a method for detecting phishing websites through URL analysis. It demonstrates that existing techniques have a high false-positive rate when testing with URLs from legitimate login pages.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Information Systems

Proactive Detection of Phishing Kit Traffic

Qian Cui et al.

Summary: This paper introduces a new method of defense against phishing attacks by detecting messages sent to attackers in real time. This method can block attacks immediately and is also beneficial for email providers. Using a Recurrent Neural Network to learn the structure of exfiltrating emails proves to be the most effective approach.

APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II (2021)

Article Computer Science, Information Systems

Efficient Detection of Botnet Traffic by Features Selection and Decision Trees

Javier Velasco-Mata et al.

Summary: Botnets pose a significant threat to online security, leading to substantial economic losses worldwide. By employing feature selection techniques like Information Gain and Gini Importance, the Decision Tree model achieved the highest performance with a mean F1 score of 85% using a five feature set.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Information Systems

Phishing Site Detection Using Similarity of Website Structure

Shoma Tanaka et al.

Summary: The researchers have proposed a method based on the similarity of website structures to effectively detect phishing sites not registered with blocklists, including those with different appearances but similar structures. Through evaluation and experimentation, the method was shown to identify phishing sites constructed using the same tools. Furthermore, the method can be improved based on the importance of web resources in web access logs.

2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC) (2021)

Review Computer Science, Information Systems

A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions

Mohammad Hijji et al.

Summary: The COVID-19 pandemic has brought about significant social and economic impacts on the world, including a rise in cybersecurity challenges focused on social engineering-based cyber-attacks. These attacks, utilizing techniques like phishing, scamming, spamming, smishing, and vishing, along with fake emails, websites, and mobile apps, have targeted critical infrastructure such as hospitals and healthcare services. The study also highlights the use of malicious software like ransomware, trojans, and bots, and emphasizes the need for advanced technology like AI, blockchain, and big data analytics for future cybersecurity solutions.

IEEE ACCESS (2021)

Proceedings Paper Automation & Control Systems

Residual Attention Dual Autoencoder for Anomaly Detection and Localization in Cigarette Packaging

Liming Zhu et al.

2020 CHINESE AUTOMATION CONGRESS (CAC 2020) (2020)

Article Computer Science, Information Systems

Classifying suspicious content in tor darknet through Semantic Attention Keypoint Filtering

Eduardo Fidalgo et al.

DIGITAL INVESTIGATION (2019)

Proceedings Paper Computer Science, Information Systems

PhishEye: Live Monitoring of Sandboxed Phishing Kits

Xiao Han et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Information Systems

Tutorial and critical analysis of phishing websites methods

Rami M. Mohammad et al.

COMPUTER SCIENCE REVIEW (2015)