Phishing Attacks Detection – A Machine Learning-Based Approach

by   Fatima Salahdine, et al.

Phishing attacks are one of the most common social engineering attacks targeting users emails to fraudulently steal confidential and sensitive information. They can be used as a part of more massive attacks launched to gain a foothold in corporate or government networks. Over the last decade, a number of anti-phishing techniques have been proposed to detect and mitigate these attacks. However, they are still inefficient and inaccurate. Thus, there is a great need for efficient and accurate detection techniques to cope with these attacks. In this paper, we proposed a phishing attack detection technique based on machine learning. We collected and analyzed more than 4000 phishing emails targeting the email service of the University of North Dakota. We modeled these attacks by selecting 10 relevant features and building a large dataset. This dataset was used to train, validate, and test the machine learning algorithms. For performance evaluation, four metrics have been used, namely probability of detection, probability of miss-detection, probability of false alarm, and accuracy. The experimental results show that better detection can be achieved using an artificial neural network.


page 1

page 2

page 3

page 4


A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication

Jamming attacks target a wireless network creating an unwanted denial of...

Towards a Universal Features Set for IoT Botnet Attacks Detection

The security pitfalls of IoT devices make it easy for the attackers to e...

Detection of Information Hiding at Anti-Copying 2D Barcodes

This paper concerns the problem of detecting the use of information hidi...

Machine learning dismantling and early-warning signals of disintegration in complex systems

From physics to engineering, biology and social science, natural and art...

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

Recent research has successfully demonstrated new types of data poisonin...

Grant-Free Access: Machine Learning for Detection of Short Packets

In this paper, we explore the use of machine learning methods as an effi...

CMOS: Dynamic Multi-key Obfuscation Structure for Strong PUFs

Strong physical unclonable function (PUF) is a promising solution for de...