4.4 Article

Detection of Phishing in Internet-of-Things Using Hybrid Deep Belief Network

Journal

INTELLIGENT AUTOMATION AND SOFT COMPUTING
Volume 36, Issue 3, Pages 3043-3056

Publisher

TECH SCIENCE PRESS
DOI: 10.32604/iasc.2023.034551

Keywords

Cyber security; internet of things; phishing attacks; fault -tolerant; devices; smart devices; cyber security attacks

Ask authors/readers for more resources

Increase in the use of internet of things owned devices is one of the reasons for increased network traffic. While connecting the smart devices with publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing system. The proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm (NWAT). The model is validated using various metrics such as prediction accuracy, Precision, recalls F1score, error rate, Mathew's Correlation Coefficient (MCC) and Balanced Detection Rate (BDR). The presented approach is compared with existing systems related to various types of phishing probes.
Increase in the use of internet of things owned devices is one of the reasons for increased network traffic. While connecting the smart devices with publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing system. The Phishing is the slow and resilient attack stacking techniques probe the users. The proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm (NWAT). Though Predictive mapping, Predictive Validation and Predictive analysis mechanism is developed. For the test purpose Canadian Institute of cyber security (CIC) dataset is used for creating a robust prediction model. This attack generates a resilience corruption works that slowly gathers the credential information from the mobiles. The proposed Predictive analysis model (PAM) enabled NWAT algorithm is used to predict the phishing probes in the form of suspicious process happening in the IoT networks. The prediction system considers the peer-to-peer communication window open for the established communication, the suspicious process and its pattern is identified by the new approach. The proposed model is validated by finding the prediction accuracy, Precision, recalls F1score, error rate, Mathew's Correlation Coefficient (MCC) and Balanced Detection Rate (BDR). The presented approach is comparatively analyzed with the state-of-the-art approach of existing system related to various types of Phishing probes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available