Skip to main content
Erschienen in: Neural Computing and Applications 23/2020

08.06.2020 | S.I. : Emerging applications of Deep Learning and Spiking ANN

Online meta-learning firewall to prevent phishing attacks

verfasst von: Hongpeng Zhu

Erschienen in: Neural Computing and Applications | Ausgabe 23/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Phishing is the most well-known act of deceiving the Internet users, in which the ‘perpetrator’ plays a credible entity. This is done by misusing the inadequate protection provided by electronic tools, and by exploiting the ignorance of the user-object, in order to illegally obtain personal data, such as sensitive private information and passwords. This research proposes the online meta-learning firewall to prevent phishing attacks. It is a highly innovative and fully automated active safety tool that uses a long short-term memory meta-learner algorithm. This method can learn to efficiently classify using a small number of samples. At the same time, it can converge with a fairly small number of steps. The proposed system is an improvement on the k-nearest neighbor with self-adjusting memory algorithm, which is inspired by the model of short and long-term memory. The purpose of the system is to understand the nature of an unknown situation and to classify it, based on the most relevant characteristics that come directly from the unknown environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Khonji M, Iraqi Y, Jones A (2013) Phishing detection: a literature survey. IEEE Commun Surv Tutor 15(4):2091–2121CrossRef Khonji M, Iraqi Y, Jones A (2013) Phishing detection: a literature survey. IEEE Commun Surv Tutor 15(4):2091–2121CrossRef
2.
Zurück zum Zitat Kaushalya SADTP, Randeniya RMRSB, Liyanage ADS (2018) An overview of social engineering in the context of information security. In: 2018 IEEE 5th international conference on engineering technologies and applied sciences (ICETAS), Bangkok, Thailand, pp 1–6 Kaushalya SADTP, Randeniya RMRSB, Liyanage ADS (2018) An overview of social engineering in the context of information security. In: 2018 IEEE 5th international conference on engineering technologies and applied sciences (ICETAS), Bangkok, Thailand, pp 1–6
3.
Zurück zum Zitat Lakhita, Yadav S, Bohra B, Pooja (2015) A review on recent phishing attacks in Internet. In: 2015 international conference on green computing and internet of things (ICGCIoT), Noida, pp 1312–1315 Lakhita, Yadav S, Bohra B, Pooja (2015) A review on recent phishing attacks in Internet. In: 2015 international conference on green computing and internet of things (ICGCIoT), Noida, pp 1312–1315
4.
Zurück zum Zitat Nadir I, Bakhshi T (2018) Contemporary cybercrime: a taxonomy of ransomware threats & mitigation techniques. In: 2018 international conference on computing, mathematics and engineering technologies (iCoMET), Sukkur, pp 1–7 Nadir I, Bakhshi T (2018) Contemporary cybercrime: a taxonomy of ransomware threats & mitigation techniques. In: 2018 international conference on computing, mathematics and engineering technologies (iCoMET), Sukkur, pp 1–7
5.
Zurück zum Zitat Almukaynizi M, Paliath V, Shah M, Shah M, Shakarian P (2018) Finding cryptocurrency attack indicators using temporal logic and darkweb data. In: 2018 IEEE international conference on intelligence and security informatics (ISI), Miami, FL, pp 91–93 Almukaynizi M, Paliath V, Shah M, Shah M, Shakarian P (2018) Finding cryptocurrency attack indicators using temporal logic and darkweb data. In: 2018 IEEE international conference on intelligence and security informatics (ISI), Miami, FL, pp 91–93
6.
Zurück zum Zitat Lema H, Simba F, Ally A (2018) Preventing utilization of shared network resources by detecting ip spoofing attacks through validation of source IP address. In: 2018 IST-Africa week conference (IST-Africa), Gaborone, pp 1–8 Lema H, Simba F, Ally A (2018) Preventing utilization of shared network resources by detecting ip spoofing attacks through validation of source IP address. In: 2018 IST-Africa week conference (IST-Africa), Gaborone, pp 1–8
7.
Zurück zum Zitat Ahmed AA, Abdullah NA (2016) Real time detection of phishing websites. In: 2016 IEEE 7th annual information technology, electronics and mobile communication conference (IEMCON), Vancouver, BC, pp 1–6 Ahmed AA, Abdullah NA (2016) Real time detection of phishing websites. In: 2016 IEEE 7th annual information technology, electronics and mobile communication conference (IEMCON), Vancouver, BC, pp 1–6
8.
Zurück zum Zitat Van der Merwe AJ, Loock M, Dabrowski M (2005) Characteristics and responsibilities involved in a phishing attack. In: Winter international symposium on information and communication technologies, Cape Town Van der Merwe AJ, Loock M, Dabrowski M (2005) Characteristics and responsibilities involved in a phishing attack. In: Winter international symposium on information and communication technologies, Cape Town
9.
Zurück zum Zitat Jain AK, Gupta B (2016) A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J Inf Secur 2016(1):9CrossRef Jain AK, Gupta B (2016) A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J Inf Secur 2016(1):9CrossRef
10.
Zurück zum Zitat Liang B, Huang J, Liu F, Wang D, Dong D, Liang Z (2009) Malicious web pages detection based on abnormal visibility recognition. In: International conference on EBusiness and information system security, 2009. EBISS’09. IEEE, pp 1–5 Liang B, Huang J, Liu F, Wang D, Dong D, Liang Z (2009) Malicious web pages detection based on abnormal visibility recognition. In: International conference on EBusiness and information system security, 2009. EBISS’09. IEEE, pp 1–5
11.
Zurück zum Zitat Garera S, Provos N, Chew M, Rubin AD (2007) A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM workshop on recurring malcode. ACM, pp 1–8 Garera S, Provos N, Chew M, Rubin AD (2007) A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM workshop on recurring malcode. ACM, pp 1–8
12.
Zurück zum Zitat Sirageldin A, Baharudin BB, Jung LT (2014) Malicious web page detection: a machine learning approach. In: Jeong H, Obaidat SM, Yen N, Park J (eds) Advances in computer science and its applications. Springer, Berlin, pp 217–224CrossRef Sirageldin A, Baharudin BB, Jung LT (2014) Malicious web page detection: a machine learning approach. In: Jeong H, Obaidat SM, Yen N, Park J (eds) Advances in computer science and its applications. Springer, Berlin, pp 217–224CrossRef
13.
Zurück zum Zitat Chandrasekaran M, Chinchani R, Upadhyaya S (2006) PHONEY: mimicking user response to detect phishing attacks. In: WOWMOM ‘06 proceedings of the 2006 international symposium on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, pp 668–672 Chandrasekaran M, Chinchani R, Upadhyaya S (2006) PHONEY: mimicking user response to detect phishing attacks. In: WOWMOM ‘06 proceedings of the 2006 international symposium on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, pp 668–672
14.
Zurück zum Zitat McRae CM, Vaughn RB (2007) Phighting the phisher: using web bugs and honeytokens to investigate the source of phishing attacks. In: Proceedings of the 40th annual Hawaii international conference on system sciences (HICSS’07) McRae CM, Vaughn RB (2007) Phighting the phisher: using web bugs and honeytokens to investigate the source of phishing attacks. In: Proceedings of the 40th annual Hawaii international conference on system sciences (HICSS’07)
15.
Zurück zum Zitat Patil V, Thakkar P, Shah C, Bhat T, Godse SP (2018) Detection and prevention of phishing websites using machine learning approach. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA), Pune, India, pp 1–5 Patil V, Thakkar P, Shah C, Bhat T, Godse SP (2018) Detection and prevention of phishing websites using machine learning approach. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA), Pune, India, pp 1–5
16.
Zurück zum Zitat Zuraiq AA, Alkasassbeh M (2019) Review: phishing detection approaches. In: 2019 2nd international conference on new trends in computing sciences (ICTCS), Amman, Jordan, pp 1–6 Zuraiq AA, Alkasassbeh M (2019) Review: phishing detection approaches. In: 2019 2nd international conference on new trends in computing sciences (ICTCS), Amman, Jordan, pp 1–6
17.
Zurück zum Zitat Adil M, Khan R, Nawaz Ul Ghani MA (2020) Preventive techniques of phishing attacks in networks. In: 2020 3rd international conference on advancements in computational sciences (ICACS), Lahore, Pakistan, pp 1–8 Adil M, Khan R, Nawaz Ul Ghani MA (2020) Preventive techniques of phishing attacks in networks. In: 2020 3rd international conference on advancements in computational sciences (ICACS), Lahore, Pakistan, pp 1–8
18.
Zurück zum Zitat Patil S, Dhage S (2019) A methodical overview on phishing detection along with an organized way to construct an anti-phishing framework. In: 2019 5th international conference on advanced computing and communication systems (ICACCS), Coimbatore, India, pp 588–593 Patil S, Dhage S (2019) A methodical overview on phishing detection along with an organized way to construct an anti-phishing framework. In: 2019 5th international conference on advanced computing and communication systems (ICACCS), Coimbatore, India, pp 588–593
19.
Zurück zum Zitat Hochreiter S, Younger AS, Conwell PR (2001) Learning to learn using gradient descent. In: Proceedings of the ICANN’01 international conference, Vienna, Austria, 21–25 August 2001, pp 87–94 Hochreiter S, Younger AS, Conwell PR (2001) Learning to learn using gradient descent. In: Proceedings of the ICANN’01 international conference, Vienna, Austria, 21–25 August 2001, pp 87–94
20.
Zurück zum Zitat Losing V, Hammer B, Wersing H (2016) KNN classifier with self adjusting memory for heterogeneous concept drift. In: 2016 IEEE 16th international conference on data mining (ICDM). IEEE, pp 291–300 Losing V, Hammer B, Wersing H (2016) KNN classifier with self adjusting memory for heterogeneous concept drift. In: 2016 IEEE 16th international conference on data mining (ICDM). IEEE, pp 291–300
22.
Zurück zum Zitat Ravi S, Larochelle H (2017) Optimization as a model for few-shot learning. In: ICLR Ravi S, Larochelle H (2017) Optimization as a model for few-shot learning. In: ICLR
23.
Zurück zum Zitat Hall P, Park BU, Samworth RJ (2008) Choice of neighbor order in nearest-neighbor classification. Ann Stat 36(5):2135–2152. arXiv:0810.5276 Hall P, Park BU, Samworth RJ (2008) Choice of neighbor order in nearest-neighbor classification. Ann Stat 36(5):2135–2152. arXiv:​0810.​5276
26.
Zurück zum Zitat Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22:4–37CrossRef Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22:4–37CrossRef
27.
Zurück zum Zitat Mishra S, Soni D (2019) SMS phishing and mitigation approaches. In: 2019 twelfth international conference on contemporary computing (IC3), Noida, India, pp 1–5 Mishra S, Soni D (2019) SMS phishing and mitigation approaches. In: 2019 twelfth international conference on contemporary computing (IC3), Noida, India, pp 1–5
28.
Zurück zum Zitat Khan I, Zhang X, Rehman M, Ali R (2020) A literature survey and empirical study of meta-learning for classifier selection. IEEE Access 8:10262–10281CrossRef Khan I, Zhang X, Rehman M, Ali R (2020) A literature survey and empirical study of meta-learning for classifier selection. IEEE Access 8:10262–10281CrossRef
29.
Zurück zum Zitat Leoshchenko S, Oliinyk A, Subbotin S, Zaiko T (2018) Using Modern architectures of recurrent neural networks for technical diagnosis of complex systems. In: 2018 international scientific-practical conference problems of infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, pp 411–416 Leoshchenko S, Oliinyk A, Subbotin S, Zaiko T (2018) Using Modern architectures of recurrent neural networks for technical diagnosis of complex systems. In: 2018 international scientific-practical conference problems of infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, pp 411–416
Metadaten
Titel
Online meta-learning firewall to prevent phishing attacks
verfasst von
Hongpeng Zhu
Publikationsdatum
08.06.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 23/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05041-z

Weitere Artikel der Ausgabe 23/2020

Neural Computing and Applications 23/2020 Zur Ausgabe

S.I. : Emerging applications of Deep Learning and Spiking ANN

Anomaly detection via blockchained deep learning smart contracts in industry 4.0