Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting phishing attacks. However, traditional CNN-based image classification methods face limitations in effectively identifying fake pages. To address this challenge, we propose an image-based coding approach for detecting phishing attacks using a CNN-LSTM hybrid model. This approach combines SMOTE, an enhanced GAN based on the Autoencoder network, and swarm intelligence algorithms to balance the dataset, select informative features, and generate grayscale images. Experiments on three benchmark datasets demonstrate that the proposed method achieves superior accuracy, precision, and sensitivity compared to other techniques, effectively identifying phishing attacks and enhancing online security.
Eser Adı (dc.title) | A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA) |
Yazar (dc.contributor.author) | Cevat Rahebi |
Yayın Yılı (dc.date.issued) | 2024 |
Tür (dc.type) | Makale |
Özet (dc.description.abstract) | Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting phishing attacks. However, traditional CNN-based image classification methods face limitations in effectively identifying fake pages. To address this challenge, we propose an image-based coding approach for detecting phishing attacks using a CNN-LSTM hybrid model. This approach combines SMOTE, an enhanced GAN based on the Autoencoder network, and swarm intelligence algorithms to balance the dataset, select informative features, and generate grayscale images. Experiments on three benchmark datasets demonstrate that the proposed method achieves superior accuracy, precision, and sensitivity compared to other techniques, effectively identifying phishing attacks and enhancing online security. |
Açık Erişim Tarihi (dc.date.available) | 2024-05-01 |
Yayıncı (dc.publisher) | Springer |
Dil (dc.language.iso) | En |
Konu Başlıkları (dc.subject) | Fake pages |
Konu Başlıkları (dc.subject) | Phishing attacks |
Konu Başlıkları (dc.subject) | SMOTE |
Konu Başlıkları (dc.subject) | Deep learning |
Konu Başlıkları (dc.subject) | Game theory |
Konu Başlıkları (dc.subject) | Convolutional neural network |
Konu Başlıkları (dc.subject) | LSTM |
Konu Başlıkları (dc.subject) | Feature selection |
Konu Başlıkları (dc.subject) | African vulture optimization algorithm (AVOA) |
Tek Biçim Adres (dc.identifier.uri) | https://hdl.handle.net/20.500.14081/2074 |
ISSN (dc.identifier.issn) | 1615-5262 |
Dergi (dc.relation.journal) | International Journal of Information Security |
Esere Katkı Sağlayan (dc.contributor.other) | Javad Rahebi |
Esere Katkı Sağlayan (dc.contributor.other) | Mustafa Ahmed Elberri |
Esere Katkı Sağlayan (dc.contributor.other) | Ümit Tokeser |
Esere Katkı Sağlayan (dc.contributor.other) | Jose Manuel Lopez-Guede |
DOI (dc.identifier.doi) | 10.1007/s10207-024-00851-x |
Orcid (dc.identifier.orcid) | 0000-0001-9875-4860 |
wosquality (dc.identifier.wosquality) | Q2 |
wosauthorid (dc.contributor.wosauthorid) | DNF-7937-2022 |
Department (dc.contributor.department) | Yazılım Mühendisliği |
Wos No (dc.identifier.wos) | WOS:001218782700002 |
Veritabanları (dc.source.platform) | Wos |
Veritabanları (dc.source.platform) | Scopus |