Skip to main content
Erschienen in: Knowledge and Information Systems 6/2022

23.05.2022 | Survey Paper

Applications of deep learning for phishing detection: a systematic literature review

verfasst von: Cagatay Catal, Görkem Giray, Bedir Tekinerdogan, Sandeep Kumar, Suyash Shukla

Erschienen in: Knowledge and Information Systems | Ausgabe 6/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online social networks, and mobile applications. To avoid and mitigate the risks of these attacks, several phishing detection approaches were developed, among which deep learning algorithms provided promising results. However, the results and the corresponding lessons learned are fragmented over many different studies and there is a lack of a systematic overview of the use of deep learning algorithms in phishing detection. Hence, we performed a systematic literature review (SLR) to identify, assess, and synthesize the results on deep learning approaches for phishing detection as reported by the selected scientific publications. We address nine research questions and provide an overview of how deep learning algorithms have been used for phishing detection from several aspects. In total, 43 journal articles were selected from electronic databases to derive the answers for the defined research questions. Our SLR study shows that except for one study, all the provided models applied supervised deep learning algorithms. The widely used data sources were URL-related data, third party information on the website, website content-related data, and email. The most used deep learning algorithms were deep neural networks (DNN), convolutional neural networks, and recurrent neural networks/long short-term memory networks. DNN and hybrid deep learning algorithms provided the best performance among other deep learning-based algorithms. 72% of the studies did not apply any feature selection algorithm to build the prediction model. PhishTank was the most used dataset among other datasets. While Keras and Tensorflow were the most preferred deep learning frameworks, 46% of the articles did not mention any framework. This study also highlights several challenges for phishing detection to pave the way for further research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abed W, Sharma S, Sutton R, Motwani A (2015) A robust bearing fault detection and diagnosis technique for brushless DC motors under non-stationary operating conditions. J Control Autom Electr Syst 26(3):241–254CrossRef Abed W, Sharma S, Sutton R, Motwani A (2015) A robust bearing fault detection and diagnosis technique for brushless DC motors under non-stationary operating conditions. J Control Autom Electr Syst 26(3):241–254CrossRef
3.
Zurück zum Zitat Ali NB, Petersen K (2014) Evaluating strategies for study selection in systematic literature studies. In: Proceedings of the 8th ACM/IEEE international symposium on empirical software engineering and measurement, pp 1–4 Ali NB, Petersen K (2014) Evaluating strategies for study selection in systematic literature studies. In: Proceedings of the 8th ACM/IEEE international symposium on empirical software engineering and measurement, pp 1–4
4.
Zurück zum Zitat Aljofey A, Jiang Q, Qu Q, Huang M, Niyigena JP (2020) An effective phishing detection model based on character level convolutional neural network from URL. Electronics 9(9):1514CrossRef Aljofey A, Jiang Q, Qu Q, Huang M, Niyigena JP (2020) An effective phishing detection model based on character level convolutional neural network from URL. Electronics 9(9):1514CrossRef
5.
Zurück zum Zitat Almomani A (2018) Fast-flux hunter: a system for filtering online fast-flux botnet. Neural Comput Appl 29(7):483–493CrossRef Almomani A (2018) Fast-flux hunter: a system for filtering online fast-flux botnet. Neural Comput Appl 29(7):483–493CrossRef
6.
Zurück zum Zitat Alom MZ, Taha TM (2017) Network intrusion detection for cyber security using unsupervised deep learning approaches. In: 2017 IEEE national aerospace and electronics conference (NAECON). IEEE, pp 63–69 Alom MZ, Taha TM (2017) Network intrusion detection for cyber security using unsupervised deep learning approaches. In: 2017 IEEE national aerospace and electronics conference (NAECON). IEEE, pp 63–69
7.
Zurück zum Zitat Amershi S, Begel A, Bird C, DeLine R, Gall H, Kamar E, Zimmermann T (2019) Software engineering for machine learning: a case study. In: 2019 IEEE/ACM 41st international conference on software engineering: software engineering in practice (ICSE-SEIP). IEEE, pp 291–300 Amershi S, Begel A, Bird C, DeLine R, Gall H, Kamar E, Zimmermann T (2019) Software engineering for machine learning: a case study. In: 2019 IEEE/ACM 41st international conference on software engineering: software engineering in practice (ICSE-SEIP). IEEE, pp 291–300
8.
Zurück zum Zitat Amyar A, Modzelewski R, Li H, Ruan S (2020) Multi-task deep learning based CT imaging analysis for COVID-19 pneumonia: Classification and segmentation. Comput Biol Med 126:104037CrossRef Amyar A, Modzelewski R, Li H, Ruan S (2020) Multi-task deep learning based CT imaging analysis for COVID-19 pneumonia: Classification and segmentation. Comput Biol Med 126:104037CrossRef
9.
Zurück zum Zitat APWG GA, Manning R (2020) APWG Phishing Reports APWG GA, Manning R (2020) APWG Phishing Reports
10.
Zurück zum Zitat Basili VR, Caldiera G, Rombach HD (1994) The goal question metric approach. Encyclopedia of software engineering, pp 528–532 Basili VR, Caldiera G, Rombach HD (1994) The goal question metric approach. Encyclopedia of software engineering, pp 528–532
11.
Zurück zum Zitat Basit A, Zafar M, Liu X, Javed AR, Jalil Z, Kifayat K (2020) A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst 76:139–154CrossRef Basit A, Zafar M, Liu X, Javed AR, Jalil Z, Kifayat K (2020) A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst 76:139–154CrossRef
12.
Zurück zum Zitat Benavides E, Fuertes W, Sanchez S, Sanchez M (2020) Classification of phishing attack solutions by employing deep learning techniques: a systematic literature review. In: Developments and advances in defense and security. Springer, Singapore, pp 51–64 Benavides E, Fuertes W, Sanchez S, Sanchez M (2020) Classification of phishing attack solutions by employing deep learning techniques: a systematic literature review. In: Developments and advances in defense and security. Springer, Singapore, pp 51–64
13.
Zurück zum Zitat Bengio Y, Lamblin P, Popovici D, Larochelle H (2006) Greedy layer-wise training of deep networks. Adv Neural Inf Process Syst 19:153–160 Bengio Y, Lamblin P, Popovici D, Larochelle H (2006) Greedy layer-wise training of deep networks. Adv Neural Inf Process Syst 19:153–160
14.
Zurück zum Zitat Berman DS, Buczak AL, Chavis JS, Corbett CL (2019) A survey of deep learning methods for cyber security. Information 10(4):122CrossRef Berman DS, Buczak AL, Chavis JS, Corbett CL (2019) A survey of deep learning methods for cyber security. Information 10(4):122CrossRef
15.
Zurück zum Zitat Catal C (2012) On the application of genetic algorithms for test case prioritization: a systematic literature review. In: Proceedings of the 2nd international workshop on Evidential assessment of software technologies, pp 9–14 Catal C (2012) On the application of genetic algorithms for test case prioritization: a systematic literature review. In: Proceedings of the 2nd international workshop on Evidential assessment of software technologies, pp 9–14
16.
Zurück zum Zitat Catal C, Mishra D (2013) Test case prioritization: a systematic mapping study. Software Qual J 21(3):445–478CrossRef Catal C, Mishra D (2013) Test case prioritization: a systematic mapping study. Software Qual J 21(3):445–478CrossRef
17.
Zurück zum Zitat Da Silva CMR, Feitosa EL, Garcia VC (2020) Heuristic-based strategy for Phishing prediction: a survey of URL-based approach. Comput Secur 88:101613CrossRef Da Silva CMR, Feitosa EL, Garcia VC (2020) Heuristic-based strategy for Phishing prediction: a survey of URL-based approach. Comput Secur 88:101613CrossRef
18.
Zurück zum Zitat Deng L (2012) Three classes of deep learning architectures and their applications: a tutorial survey. APSIPA Trans Signal Inf Process 57:58 Deng L (2012) Three classes of deep learning architectures and their applications: a tutorial survey. APSIPA Trans Signal Inf Process 57:58
20.
Zurück zum Zitat Dou Z, Khalil I, Khreishah A, Al-Fuqaha A, Guizani M (2017) Systematization of knowledge (SoK): a systematic review of software-based web phishing detection. IEEE Commun Surv Tutor 19(4):2797–2819CrossRef Dou Z, Khalil I, Khreishah A, Al-Fuqaha A, Guizani M (2017) Systematization of knowledge (SoK): a systematic review of software-based web phishing detection. IEEE Commun Surv Tutor 19(4):2797–2819CrossRef
21.
Zurück zum Zitat El Aassal A, Baki S, Das A, Verma RM (2020) An in-depth benchmarking and evaluation of phishing detection research for security needs. IEEE Access 8:22170–22192CrossRef El Aassal A, Baki S, Das A, Verma RM (2020) An in-depth benchmarking and evaluation of phishing detection research for security needs. IEEE Access 8:22170–22192CrossRef
22.
Zurück zum Zitat Emamgholizadeh S, Mohammadi B (2021) New hybrid nature-based algorithm to integration support vector machine for prediction of soil cation exchange capacity. Soft Comput 25(21):13451–13464CrossRef Emamgholizadeh S, Mohammadi B (2021) New hybrid nature-based algorithm to integration support vector machine for prediction of soil cation exchange capacity. Soft Comput 25(21):13451–13464CrossRef
23.
Zurück zum Zitat Feng J, Zou L, Nan T (2019) A phishing webpage detection method based on stacked autoencoder and correlation coefficients. J Comput Inf Technol 27(2):41–54CrossRef Feng J, Zou L, Nan T (2019) A phishing webpage detection method based on stacked autoencoder and correlation coefficients. J Comput Inf Technol 27(2):41–54CrossRef
24.
Zurück zum Zitat Ferreira M (2019) Malicious URL detection using machine learning algorithms. In: Proc. Digit. Privacy Security Conf., pp 114–122 Ferreira M (2019) Malicious URL detection using machine learning algorithms. In: Proc. Digit. Privacy Security Conf., pp 114–122
25.
Zurück zum Zitat Fukushima K, Miyake S (1982) Neocognitron: a self-organizing neural network model for a mechanism of visual pattern recognition. In: Competition and cooperation in neural nets. Springer, Berlin, Heidelberg, pp 267–285 Fukushima K, Miyake S (1982) Neocognitron: a self-organizing neural network model for a mechanism of visual pattern recognition. In: Competition and cooperation in neural nets. Springer, Berlin, Heidelberg, pp 267–285
26.
Zurück zum Zitat Gangavarapu T, Jaidhar CD, Chanduka B (2020) Applicability of machine learning in spam and phishing email filtering: review and approaches. Artif Intell Rev 53:5019–5081CrossRef Gangavarapu T, Jaidhar CD, Chanduka B (2020) Applicability of machine learning in spam and phishing email filtering: review and approaches. Artif Intell Rev 53:5019–5081CrossRef
27.
Zurück zum Zitat Gardner MW, Dorling SR (1998) Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences. Atmos Environ 32(14–15):2627–2636CrossRef Gardner MW, Dorling SR (1998) Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences. Atmos Environ 32(14–15):2627–2636CrossRef
28.
Zurück zum Zitat Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp 249–256 Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp 249–256
29.
Zurück zum Zitat Goel D, Jain AK (2018) Mobile phishing attacks and defence mechanisms: State of art and open research challenges. Comput Secur 73:519–544CrossRef Goel D, Jain AK (2018) Mobile phishing attacks and defence mechanisms: State of art and open research challenges. Comput Secur 73:519–544CrossRef
30.
Zurück zum Zitat Goodfellow I, Bengio Y, Courville A, Bengio Y (2016) Deep learning, vol 1. MIT Press, CambridgeMATH Goodfellow I, Bengio Y, Courville A, Bengio Y (2016) Deep learning, vol 1. MIT Press, CambridgeMATH
31.
Zurück zum Zitat Gowtham R, Krishnamurthi I (2014) A comprehensive and efficacious architecture for detecting phishing webpages. Comput Secur 40:23–37CrossRef Gowtham R, Krishnamurthi I (2014) A comprehensive and efficacious architecture for detecting phishing webpages. Comput Secur 40:23–37CrossRef
32.
Zurück zum Zitat Greff K, Srivastava RK, Koutník J, Steunebrink BR, Schmidhuber J (2016) LSTM: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222–2232MathSciNetCrossRef Greff K, Srivastava RK, Koutník J, Steunebrink BR, Schmidhuber J (2016) LSTM: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222–2232MathSciNetCrossRef
33.
Zurück zum Zitat Hannousse A, Yahiouche S (2021) Towards benchmark datasets for machine learning based website phishing detection: an experimental study. Eng Appl Artif Intell 104:104347CrossRef Hannousse A, Yahiouche S (2021) Towards benchmark datasets for machine learning based website phishing detection: an experimental study. Eng Appl Artif Intell 104:104347CrossRef
34.
Zurück zum Zitat Hassler E, Carver JC, Kraft NA, Hale D (2014) Outcomes of a community workshop to identify and rank barriers to the systematic literature review process. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering, pp 1–10 Hassler E, Carver JC, Kraft NA, Hale D (2014) Outcomes of a community workshop to identify and rank barriers to the systematic literature review process. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering, pp 1–10
35.
Zurück zum Zitat Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780CrossRef Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780CrossRef
36.
Zurück zum Zitat Hornik K, Stinchcombe M, White H (1989) Multilayer feedforward networks are universal approximators. Neural Netw 2(5):359–366MATHCrossRef Hornik K, Stinchcombe M, White H (1989) Multilayer feedforward networks are universal approximators. Neural Netw 2(5):359–366MATHCrossRef
37.
Zurück zum Zitat Hrasko R, Pacheco AG, Krohling RA (2015) Time series prediction using restricted boltzmann machines and backpropagation. Procedia Comput Sci 55:990–999CrossRef Hrasko R, Pacheco AG, Krohling RA (2015) Time series prediction using restricted boltzmann machines and backpropagation. Procedia Comput Sci 55:990–999CrossRef
38.
Zurück zum Zitat Khonji M, Iraqi Y, Jones A (2013) Phishing detection: a literature survey. IEEE Commun Surv Tutor 15(4):2091–2121CrossRef Khonji M, Iraqi Y, Jones A (2013) Phishing detection: a literature survey. IEEE Commun Surv Tutor 15(4):2091–2121CrossRef
39.
Zurück zum Zitat Kiruthiga R, Akila D (2019) Phishing websites detection using machine learning. Int J Recent Technol Eng 8(2):111–114 Kiruthiga R, Akila D (2019) Phishing websites detection using machine learning. Int J Recent Technol Eng 8(2):111–114
41.
Zurück zum Zitat Kitchenham BA, Budgen D, Brereton P (2015) Evidence-based software engineering and systematic reviews, vol 4. CRC Press, Boca RatonCrossRef Kitchenham BA, Budgen D, Brereton P (2015) Evidence-based software engineering and systematic reviews, vol 4. CRC Press, Boca RatonCrossRef
42.
Zurück zum Zitat Li Q, Cheng M, Wang J, Sun B (2020) LSTM based phishing detection for big email data. IEEE Trans Big Data 8(1):278–288CrossRef Li Q, Cheng M, Wang J, Sun B (2020) LSTM based phishing detection for big email data. IEEE Trans Big Data 8(1):278–288CrossRef
43.
Zurück zum Zitat Mahdavifar S, Ghorbani AA (2019) Application of deep learning to cybersecurity: a survey. Neurocomputing 347:149–176CrossRef Mahdavifar S, Ghorbani AA (2019) Application of deep learning to cybersecurity: a survey. Neurocomputing 347:149–176CrossRef
44.
Zurück zum Zitat Maurya S, Jain A (2020) Deep learning to combat phishing. J Stat Manag Syst 23(6):945–957 Maurya S, Jain A (2020) Deep learning to combat phishing. J Stat Manag Syst 23(6):945–957
45.
Zurück zum Zitat Miles MB, Huberman AM, Saldaña J (2019) Qualitative data analysis: a methods sourcebook, 4th edn. SAGE Publications Inc, Thousand Oaks Miles MB, Huberman AM, Saldaña J (2019) Qualitative data analysis: a methods sourcebook, 4th edn. SAGE Publications Inc, Thousand Oaks
46.
Zurück zum Zitat Mohamed AR, Dahl G, Hinton G (2009) Deep belief networks for phone recognition. In: Nips workshop on deep learning for speech recognition and related applications, vol 1, no 9, p 39 Mohamed AR, Dahl G, Hinton G (2009) Deep belief networks for phone recognition. In: Nips workshop on deep learning for speech recognition and related applications, vol 1, no 9, p 39
47.
Zurück zum Zitat Mohammadi B, Guan Y, Moazenzadeh R, Safari MJS (2021) Implementation of hybrid particle swarm optimization-differential evolution algorithms coupled with multi-layer perceptron for suspended sediment load estimation. CATENA 198:105024CrossRef Mohammadi B, Guan Y, Moazenzadeh R, Safari MJS (2021) Implementation of hybrid particle swarm optimization-differential evolution algorithms coupled with multi-layer perceptron for suspended sediment load estimation. CATENA 198:105024CrossRef
48.
Zurück zum Zitat Mohammed Harun Babu R, Vinayakumar R, Soman KP (2018) A short review on applications of deep learning for cyber security. arXiv preprint arXiv:1812.06292 Mohammed Harun Babu R, Vinayakumar R, Soman KP (2018) A short review on applications of deep learning for cyber security. arXiv preprint arXiv:​1812.​06292
49.
Zurück zum Zitat Nagaraj K, Bhattacharjee B, Sridhar A, Sharvani G (2018) Detection of phishing websites using a novel twofold ensemble model. J Syst Inf Technol. Nagaraj K, Bhattacharjee B, Sridhar A, Sharvani G (2018) Detection of phishing websites using a novel twofold ensemble model. J Syst Inf Technol.
50.
Zurück zum Zitat Pascanu R, Mikolov T, Bengio Y (2013) On the difficulty of training recurrent neural networks. In: International conference on machine learning, pp 1310–1318 Pascanu R, Mikolov T, Bengio Y (2013) On the difficulty of training recurrent neural networks. In: International conference on machine learning, pp 1310–1318
51.
Zurück zum Zitat Peng Y, Tian S, Yu L, Lv Y, Wang R (2019) A joint approach to detect malicious URL based on attention mechanism. Int J Comput Intell Appl 18(03):1950021CrossRef Peng Y, Tian S, Yu L, Lv Y, Wang R (2019) A joint approach to detect malicious URL based on attention mechanism. Int J Comput Intell Appl 18(03):1950021CrossRef
52.
Zurück zum Zitat Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: 12th international conference on evaluation and assessment in software engineering (EASE) 12, pp 1–10 Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: 12th international conference on evaluation and assessment in software engineering (EASE) 12, pp 1–10
53.
Zurück zum Zitat Petersen K, Vakkalanka S, Kuzniarz L (2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol 64:1–18CrossRef Petersen K, Vakkalanka S, Kuzniarz L (2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol 64:1–18CrossRef
54.
Zurück zum Zitat Qiu X, Zhang L, Ren Y, Suganthan PN, Amaratunga G (2014) Ensemble deep learning for regression and time series forecasting. In: 2014 IEEE symposium on computational intelligence in ensemble learning (CIEL). IEEE, pp 1–6 Qiu X, Zhang L, Ren Y, Suganthan PN, Amaratunga G (2014) Ensemble deep learning for regression and time series forecasting. In: 2014 IEEE symposium on computational intelligence in ensemble learning (CIEL). IEEE, pp 1–6
55.
Zurück zum Zitat Ramzan Z, Wüest C (2007) Phishing attacks: analyzing trends in 2006. In: CEAS Ramzan Z, Wüest C (2007) Phishing attacks: analyzing trends in 2006. In: CEAS
56.
Zurück zum Zitat Rao RS, Pais AR (2019) Jail-Phish: an improved search engine based phishing detection system. Comput Secur 83:246–267CrossRef Rao RS, Pais AR (2019) Jail-Phish: an improved search engine based phishing detection system. Comput Secur 83:246–267CrossRef
57.
Zurück zum Zitat Ravi R (2020) A performance analysis of software defined network based prevention on phishing attack in cyberspace using a deep machine learning with CANTINA approach (DMLCA). Comput Commun 153:375–381CrossRef Ravi R (2020) A performance analysis of software defined network based prevention on phishing attack in cyberspace using a deep machine learning with CANTINA approach (DMLCA). Comput Commun 153:375–381CrossRef
58.
Zurück zum Zitat Sahoo D, Liu C, Hoi SC (2017) Malicious URL detection using machine learning: a survey. arXiv preprint arXiv:1701.07179 Sahoo D, Liu C, Hoi SC (2017) Malicious URL detection using machine learning: a survey. arXiv preprint arXiv:1701.07179
59.
Zurück zum Zitat Seydoux L, Balestriero R, Poli P, De Hoop M, Campillo M, Baraniuk R (2020) Clustering earthquake signals and background noises in continuous seismic data with unsupervised deep learning. Nat Commun 11(1):1–12CrossRef Seydoux L, Balestriero R, Poli P, De Hoop M, Campillo M, Baraniuk R (2020) Clustering earthquake signals and background noises in continuous seismic data with unsupervised deep learning. Nat Commun 11(1):1–12CrossRef
60.
Zurück zum Zitat Sharmeen S, Huda S, Abawajy J, Hassan MM (2020) An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl Soft Comput 89:106089CrossRef Sharmeen S, Huda S, Abawajy J, Hassan MM (2020) An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl Soft Comput 89:106089CrossRef
61.
Zurück zum Zitat Shrivastava V, Damodaran SS, Kamble M (2020) Adalward: a deep-learning framework for multi-class malicious webpage detection. J Cyber Secur Technol 4:153–195CrossRef Shrivastava V, Damodaran SS, Kamble M (2020) Adalward: a deep-learning framework for multi-class malicious webpage detection. J Cyber Secur Technol 4:153–195CrossRef
62.
Zurück zum Zitat Singh C, Meenu (2020) Phishing website detection based on machine learning: a survey. In: 2020 6th international conference on advanced computing and communication systems (ICACCS). IEEE, pp 398–404 Singh C, Meenu (2020) Phishing website detection based on machine learning: a survey. In: 2020 6th international conference on advanced computing and communication systems (ICACCS). IEEE, pp 398–404
63.
Zurück zum Zitat Somesha M, Pais AR, Rao RS, Rathour VS (2020) Efficient deep learning techniques for the detection of phishing websites. Sādhanā 45(1):1–18CrossRef Somesha M, Pais AR, Rao RS, Rathour VS (2020) Efficient deep learning techniques for the detection of phishing websites. Sādhanā 45(1):1–18CrossRef
64.
Zurück zum Zitat Song L, Lin JP, Wang ZJ, Wang H (2020) An end-to-end multi-task deep learning framework for skin lesion analysis. IEEE J Biomed Health Inform 24:2912–2921CrossRef Song L, Lin JP, Wang ZJ, Wang H (2020) An end-to-end multi-task deep learning framework for skin lesion analysis. IEEE J Biomed Health Inform 24:2912–2921CrossRef
65.
Zurück zum Zitat Sullins LL (2006) Phishing for a solution: Domestic and international approaches to decreasing online identity theft. Emory Int’l L Rev 20:397 Sullins LL (2006) Phishing for a solution: Domestic and international approaches to decreasing online identity theft. Emory Int’l L Rev 20:397
66.
Zurück zum Zitat Sumathi K, Sujatha V (2019) Deep learning based-phishing attack detection. Int J Recent Technol Eng (IJRTE) 8(3):8428–8432CrossRef Sumathi K, Sujatha V (2019) Deep learning based-phishing attack detection. Int J Recent Technol Eng (IJRTE) 8(3):8428–8432CrossRef
67.
Zurück zum Zitat Tarhan A, Giray G (2017) On the use of ontologies in software process assessment: a systematic literature review. In Proceedings of the 21st international conference on evaluation and assessment in software engineering, pp 2–11 Tarhan A, Giray G (2017) On the use of ontologies in software process assessment: a systematic literature review. In Proceedings of the 21st international conference on evaluation and assessment in software engineering, pp 2–11
68.
Zurück zum Zitat Torres-Soto J, Ashley EA (2020) Multi-task deep learning for cardiac rhythm detection in wearable devices. NPJ Digital Med 3(1):1–8CrossRef Torres-Soto J, Ashley EA (2020) Multi-task deep learning for cardiac rhythm detection in wearable devices. NPJ Digital Med 3(1):1–8CrossRef
70.
Zurück zum Zitat Varshney G, Misra M, Atrey PK (2016) A survey and classification of web phishing detection schemes. Secur Commun Netw 9(18):6266–6284CrossRef Varshney G, Misra M, Atrey PK (2016) A survey and classification of web phishing detection schemes. Secur Commun Netw 9(18):6266–6284CrossRef
71.
Zurück zum Zitat Vayansky I, Kumar S (2018) Phishing–challenges and solutions. Comput Fraud Secur 2018(1):15–20CrossRef Vayansky I, Kumar S (2018) Phishing–challenges and solutions. Comput Fraud Secur 2018(1):15–20CrossRef
72.
Zurück zum Zitat Vinayakumar R, Soman KP, Poornachandran P (2018) Evaluating deep learning approaches to characterize and classify malicious URL’s. J Intell Fuzzy Syst 34(3):1333–1343CrossRef Vinayakumar R, Soman KP, Poornachandran P (2018) Evaluating deep learning approaches to characterize and classify malicious URL’s. J Intell Fuzzy Syst 34(3):1333–1343CrossRef
73.
Zurück zum Zitat Vrbančič G, Fister I Jr, Podgorelec V (2020) Datasets for phishing websites detection. Data Brief 33:106438CrossRef Vrbančič G, Fister I Jr, Podgorelec V (2020) Datasets for phishing websites detection. Data Brief 33:106438CrossRef
74.
Zurück zum Zitat Wang Y, Cai WD, Wei PC (2016) A deep learning approach for detecting malicious JavaScript code. Secur Commun Netw 9(11):1520–1534CrossRef Wang Y, Cai WD, Wei PC (2016) A deep learning approach for detecting malicious JavaScript code. Secur Commun Netw 9(11):1520–1534CrossRef
75.
Zurück zum Zitat Wang HH, Yu L, Tian SW, Peng YF, Pei XJ (2019) Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl Intell 49(8):3016–3026CrossRef Wang HH, Yu L, Tian SW, Peng YF, Pei XJ (2019) Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl Intell 49(8):3016–3026CrossRef
77.
Zurück zum Zitat Wang L, Tong L, Davis D, Arnold T, Esposito T (2020) The application of unsupervised deep learning in predictive models using electronic health records. BMC Med Res Methodol 20(1):1–9CrossRef Wang L, Tong L, Davis D, Arnold T, Esposito T (2020) The application of unsupervised deep learning in predictive models using electronic health records. BMC Med Res Methodol 20(1):1–9CrossRef
78.
Zurück zum Zitat Wei X, Wei X, Kong X, Lu S, Xing W, Lu W (2020) FMixCutMatch for semi-supervised deep learning. Neural Netw 133:166–176CrossRef Wei X, Wei X, Kong X, Lu S, Xing W, Lu W (2020) FMixCutMatch for semi-supervised deep learning. Neural Netw 133:166–176CrossRef
79.
Zurück zum Zitat Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering—EASE ’14, 1–10. https://doi.org/10.1145/2601248.2601268 Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering—EASE ’14, 1–10. https://​doi.​org/​10.​1145/​2601248.​2601268
80.
Zurück zum Zitat Wong M (2019) Deep learning models for malicious web content detection: an enterprise study (Doctoral dissertation). Wong M (2019) Deep learning models for malicious web content detection: an enterprise study (Doctoral dissertation).
81.
Zurück zum Zitat Wu Y, Schuster M, Chen Z, Le QV, Norouzi M, Macherey W, Klingner J (2016) Google’s neural machine translation system: bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144 Wu Y, Schuster M, Chen Z, Le QV, Norouzi M, Macherey W, Klingner J (2016) Google’s neural machine translation system: bridging the gap between human and machine translation. arXiv preprint arXiv:​1609.​08144
82.
Zurück zum Zitat Xia P, Wang H, Zhang B, Ji R, Gao B, Wu L, Xu G (2020) Characterizing cryptocurrency exchange scams. Comput Secur 98:101993CrossRef Xia P, Wang H, Zhang B, Ji R, Gao B, Wu L, Xu G (2020) Characterizing cryptocurrency exchange scams. Comput Secur 98:101993CrossRef
84.
Zurück zum Zitat Yu D, Deng L (2010) Deep learning and its applications to signal and information processing [exploratory dsp]. IEEE Signal Process Mag 28(1):145–154CrossRef Yu D, Deng L (2010) Deep learning and its applications to signal and information processing [exploratory dsp]. IEEE Signal Process Mag 28(1):145–154CrossRef
85.
Zurück zum Zitat Zamir A, Khan HU, Iqbal T, Yousaf N, Aslam F, Anjum A, Hamdani M (2020) Phishing web site detection using diverse machine learning algorithms. Electron Libr 38(1):65–80CrossRef Zamir A, Khan HU, Iqbal T, Yousaf N, Aslam F, Anjum A, Hamdani M (2020) Phishing web site detection using diverse machine learning algorithms. Electron Libr 38(1):65–80CrossRef
86.
Zurück zum Zitat Zhang Y, Wang J, Chen B (2020) Detecting false data injection attacks in smart grids: a semi-supervised deep learning approach. IEEE Trans Smart Grid 12:623–634CrossRef Zhang Y, Wang J, Chen B (2020) Detecting false data injection attacks in smart grids: a semi-supervised deep learning approach. IEEE Trans Smart Grid 12:623–634CrossRef
87.
Zurück zum Zitat Zuraiq AA, Alkasassbeh M (2019) Phishing detection approaches. In: 2019 2nd international conference on new trends in computing sciences (ICTCS). IEEE, pp 1–6 Zuraiq AA, Alkasassbeh M (2019) Phishing detection approaches. In: 2019 2nd international conference on new trends in computing sciences (ICTCS). IEEE, pp 1–6
[P1]
Zurück zum Zitat Anwar S, Al-Obeidat F, Tubaishat A, Din S, Ahmad A, Khan FA, Jeon G, Loo J (2020) Countering malicious URLs in internet of things using a knowledge-based approach and a simulated expert. IEEE Internet Things J 7(5):4497–4504CrossRef Anwar S, Al-Obeidat F, Tubaishat A, Din S, Ahmad A, Khan FA, Jeon G, Loo J (2020) Countering malicious URLs in internet of things using a knowledge-based approach and a simulated expert. IEEE Internet Things J 7(5):4497–4504CrossRef
[P2]
Zurück zum Zitat Abdi FD, Wenjuan L (2017) Malicious URL detection using convolutional neural network. J Int J Comput Sci Eng Inf Technol 7(6):1–8 Abdi FD, Wenjuan L (2017) Malicious URL detection using convolutional neural network. J Int J Comput Sci Eng Inf Technol 7(6):1–8
[P5]
Zurück zum Zitat Ali W, Ahmed AA (2019) Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. IET Inf Secur 13(6):659–669CrossRef Ali W, Ahmed AA (2019) Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. IET Inf Secur 13(6):659–669CrossRef
[P7]
Zurück zum Zitat Baccouche A, Ahmed S, Sierra-Sosa D, Elmaghraby A (2020) Malicious text identification: deep learning from public comments and emails. Information 11(6):312CrossRef Baccouche A, Ahmed S, Sierra-Sosa D, Elmaghraby A (2020) Malicious text identification: deep learning from public comments and emails. Information 11(6):312CrossRef
[P8]
Zurück zum Zitat Bozkir AS, Aydos M (2020) LogoSENSE: a companion HOG based logo detection scheme for phishing web page and e-mail brand recognition. Comput Secur 95:101855CrossRef Bozkir AS, Aydos M (2020) LogoSENSE: a companion HOG based logo detection scheme for phishing web page and e-mail brand recognition. Comput Secur 95:101855CrossRef
[P9]
Zurück zum Zitat Digwal HN, Kavya NP (2020) Detection of phishing website based on deep learning. Int J Res Eng Sci Manag 3(8):331–336 Digwal HN, Kavya NP (2020) Detection of phishing website based on deep learning. Int J Res Eng Sci Manag 3(8):331–336
[P10]
Zurück zum Zitat Fang Y, Zhang C, Huang C, Liu L, Yang Y (2019) Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism. IEEE Access 7:56329–56340CrossRef Fang Y, Zhang C, Huang C, Liu L, Yang Y (2019) Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism. IEEE Access 7:56329–56340CrossRef
[P12]
Zurück zum Zitat Kumar MS, Indrani B (2020) Frequent rule reduction for phishing URL classification using fuzzy deep neural network model. Iran J Comput Sci 4:85–93CrossRef Kumar MS, Indrani B (2020) Frequent rule reduction for phishing URL classification using fuzzy deep neural network model. Iran J Comput Sci 4:85–93CrossRef
[P14]
Zurück zum Zitat Li T, Kou G, Peng Y (2020) Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods. Inf Syst 91:101494CrossRef Li T, Kou G, Peng Y (2020) Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods. Inf Syst 91:101494CrossRef
[P15]
Zurück zum Zitat Mahdavifar S, Ghorbani AA (2020) DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Comput Appl 32:14753–14780CrossRef Mahdavifar S, Ghorbani AA (2020) DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Comput Appl 32:14753–14780CrossRef
[P18]
Zurück zum Zitat Phomkeona S, Okamura K (2020) Zero-day malicious email investigation and detection using features with deep-learning approach. J Inf Process 28:222–229 Phomkeona S, Okamura K (2020) Zero-day malicious email investigation and detection using features with deep-learning approach. J Inf Process 28:222–229
[P19]
Zurück zum Zitat Rao RS, Pais AR (2019) Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput Appl 31(8):3851–3873CrossRef Rao RS, Pais AR (2019) Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput Appl 31(8):3851–3873CrossRef
[P20]
Zurück zum Zitat Rao RS, Vaishnavi T, Pais AR (2019) PhishDump: a multi-model ensemble based technique for the detection of phishing sites in mobile devices. Pervasive Mobile Comput 60:101084CrossRef Rao RS, Vaishnavi T, Pais AR (2019) PhishDump: a multi-model ensemble based technique for the detection of phishing sites in mobile devices. Pervasive Mobile Comput 60:101084CrossRef
[P21]
Zurück zum Zitat Selvaganapathy S, Nivaashini M, Natarajan H (2018) Deep belief network based detection and categorization of malicious URLs. Inf Secur J A Global Perspect 27(3):145–161CrossRef Selvaganapathy S, Nivaashini M, Natarajan H (2018) Deep belief network based detection and categorization of malicious URLs. Inf Secur J A Global Perspect 27(3):145–161CrossRef
[P22]
Zurück zum Zitat Sur C (2018) Ensemble one-vs-all learning technique with emphatic & rehearsal training for phishing email classification using psychology. J Exp Theor Artif Intell 30(6):733–762CrossRef Sur C (2018) Ensemble one-vs-all learning technique with emphatic & rehearsal training for phishing email classification using psychology. J Exp Theor Artif Intell 30(6):733–762CrossRef
[P23]
Zurück zum Zitat Vinayakumar R, Soman KP, Poornachandran P (2018) Detecting malicious domain names using deep learning approaches at scale. J Intell Fuzzy Syst 34(3):1355–1367CrossRef Vinayakumar R, Soman KP, Poornachandran P (2018) Detecting malicious domain names using deep learning approaches at scale. J Intell Fuzzy Syst 34(3):1355–1367CrossRef
[P24]
Zurück zum Zitat Vrbančič G, Fister I Jr, Podgorelec V (2019) Parameter setting for deep neural networks using swarm intelligence on phishing websites classification. Int J Artif Intell Tools 28(06):1960008CrossRef Vrbančič G, Fister I Jr, Podgorelec V (2019) Parameter setting for deep neural networks using swarm intelligence on phishing websites classification. Int J Artif Intell Tools 28(06):1960008CrossRef
[P25]
Zurück zum Zitat Wanda P, Jie HJ (2019) URLDeep: continuous prediction of malicious URL with dynamic deep learning in social networks. IJ Netw Secur 21(6):971–978 Wanda P, Jie HJ (2019) URLDeep: continuous prediction of malicious URL with dynamic deep learning in social networks. IJ Netw Secur 21(6):971–978
[P26]
Zurück zum Zitat Wang HH, Tian SW, Yu L, Wang XX, Qi QS, Chen JH (2020) Bidirectional IndRNN malicious webpages detection algorithm based on convolutional neural network and attention mechanism. J Intell Fuzzy Syst 38(2):1929–1941CrossRef Wang HH, Tian SW, Yu L, Wang XX, Qi QS, Chen JH (2020) Bidirectional IndRNN malicious webpages detection algorithm based on convolutional neural network and attention mechanism. J Intell Fuzzy Syst 38(2):1929–1941CrossRef
[P27]
Zurück zum Zitat Wei B, Hamad RA, Yang L, He X, Wang H, Gao B, Woo WL (2019) A deep-learning-driven light-weight phishing detection sensor. Sensors 19(19):4258CrossRef Wei B, Hamad RA, Yang L, He X, Wang H, Gao B, Woo WL (2019) A deep-learning-driven light-weight phishing detection sensor. Sensors 19(19):4258CrossRef
[P28]
Zurück zum Zitat Wei W, Ke Q, Nowak J, Korytkowski M, Scherer R, Woźniak M (2020) Accurate and fast URL phishing detector: a convolutional neural network approach. Comput Netw 178:107275CrossRef Wei W, Ke Q, Nowak J, Korytkowski M, Scherer R, Woźniak M (2020) Accurate and fast URL phishing detector: a convolutional neural network approach. Comput Netw 178:107275CrossRef
[P29]
Zurück zum Zitat Xiao X, Zhang D, Hu G, Jiang Y, Xia S (2020) CNN-MHSA: a convolutional neural network and multi-head self-attention combined approach for detecting phishing websites. Neural Netw 125:303–312CrossRef Xiao X, Zhang D, Hu G, Jiang Y, Xia S (2020) CNN-MHSA: a convolutional neural network and multi-head self-attention combined approach for detecting phishing websites. Neural Netw 125:303–312CrossRef
[P30]
Zurück zum Zitat Yang P, Zhao G, Zeng P (2019) Phishing website detection based on multidimensional features driven by deep learning. IEEE Access 7:15196–15209CrossRef Yang P, Zhao G, Zeng P (2019) Phishing website detection based on multidimensional features driven by deep learning. IEEE Access 7:15196–15209CrossRef
[P31]
Zurück zum Zitat Yang W, Zuo W, Cui B (2019) Detecting malicious urls via a keyword-based convolutional gated-recurrent-unit neural network. IEEE Access 7:29891–29900CrossRef Yang W, Zuo W, Cui B (2019) Detecting malicious urls via a keyword-based convolutional gated-recurrent-unit neural network. IEEE Access 7:29891–29900CrossRef
[P32]
Zurück zum Zitat Zhu E, Chen Y, Ye C, Li X, Liu F (2019) OFS-NN: an effective phishing websites detection model based on optimal feature selection and neural network. IEEE Access 7:73271–73284CrossRef Zhu E, Chen Y, Ye C, Li X, Liu F (2019) OFS-NN: an effective phishing websites detection model based on optimal feature selection and neural network. IEEE Access 7:73271–73284CrossRef
[P33]
Zurück zum Zitat Zhu E, Ju Y, Chen Z, Liu F, Fang X (2020) DTOF-ANN: an artificial neural network phishing detection model based on decision tree and optimal features. Appl Soft Comput 95:106505CrossRef Zhu E, Ju Y, Chen Z, Liu F, Fang X (2020) DTOF-ANN: an artificial neural network phishing detection model based on decision tree and optimal features. Appl Soft Comput 95:106505CrossRef
Metadaten
Titel
Applications of deep learning for phishing detection: a systematic literature review
verfasst von
Cagatay Catal
Görkem Giray
Bedir Tekinerdogan
Sandeep Kumar
Suyash Shukla
Publikationsdatum
23.05.2022
Verlag
Springer London
Erschienen in
Knowledge and Information Systems / Ausgabe 6/2022
Print ISSN: 0219-1377
Elektronische ISSN: 0219-3116
DOI
https://doi.org/10.1007/s10115-022-01672-x

Weitere Artikel der Ausgabe 6/2022

Knowledge and Information Systems 6/2022 Zur Ausgabe