3.8 Proceedings Paper

PWDGAN: Generating Adversarial Malicious URL Examples for Deceiving Black-Box Phishing Website Detector using GANs

Publisher

IEEE
DOI: 10.1109/ICMLANT53170.2021.9690540

Keywords

Generative Adversarial Networks (GAN); Phishing Detection; Adversarial Attacks; Black-box Attacks

Ask authors/readers for more resources

In recent years, there has been a significant increase in phishing attacks on the Internet, with attackers using increasingly sophisticated techniques to bypass traditional defense solutions. Research has developed solutions and software products to enhance the ability to detect phishing attacks using machine learning and deep learning algorithms. A model based on generative adversarial network (GAN) was built to evade and bypass ML-based phishing detectors, demonstrating the effectiveness of GAN in creating new patterns that can deceive these detectors.
In recent years, the Internet has witnessed a significant increase in phishing attacks. These attacks are not merely deceiving Internet users to get their sensitive information, but phishing attacks are developing more and more sophisticated, using many new techniques to try to bypass the traditional defense solution. With the help of machine learning and deep learning algorithms, there are researched solutions and software products to help improve the ability to detect phishing attacks. In this article, we build a model based on generative adversarial network (GAN) - a deep learning-based framework to conduct black-box attacks using Phishtank and Alexa datasets that try to evade and bypass ML-based phishing detectors. We apply PWDGAN to carry out the attacks against the ML-based black-box classifiers and then deceive successfully these detectors with the rate of detecting malicious samples value of approximately 0% after 500 training epochs. The results of the paper demonstrate the effectiveness of GAN adoption in creating new patterns that can evade and bypass phishing detectors. These newly generated patterns can serve as material for future research in phishing website detection and improve the ability to detect novel anomaly attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available