Skip to main content

2024 | OriginalPaper | Buchkapitel

Phishing Classification Based on Text Content of an Email Body Using Transformers

verfasst von : M. Somesha, Alwyn R. Pais

Erschienen in: Information Security, Privacy and Digital Forensics

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Phishing attacks steal sensitive credentials using different techniques, tools, and some sophisticated methods. The techniques include content injection, information re-routing, social engineering, server hacking, social networking, SMS and WhatsApp mobile applications. To overcome such attacks and minimize risks of such attacks, many phishing detection and avoidance techniques were introduced. Among various techniques, deep learning algorithms achieved the efficient results. In the proposed work, a transformers-based technique is used to classify phishing emails. The proposed method outperformed the other similar mechanisms for the classification of phishing emails. The phishing classification accuracy achieved by the proposed work is 99.51% using open-source datasets. The proposed model is also used to learn and validate the correctness of the in-house created datasets. The obtained results with in-house datasets are equally competitive.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sharma H, Meenakshi E, Bhatia SK (2017) A comparative analysis and awareness survey of phishing detection tools. In: 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT). IEEE, pp 1437–1442 Sharma H, Meenakshi E, Bhatia SK (2017) A comparative analysis and awareness survey of phishing detection tools. In: 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT). IEEE, pp 1437–1442
3.
Zurück zum Zitat Salloum S, Gaber T, Vadera S, Sharan K (2022) A systematic literature review on phishing email detection using natural language processing techniques. IEEE Access Salloum S, Gaber T, Vadera S, Sharan K (2022) A systematic literature review on phishing email detection using natural language processing techniques. IEEE Access
4.
Zurück zum Zitat Hamid IRA, Abawajy J (2011) Hybrid feature selection for phishing email detection. In: International conference on algorithms and architectures for parallel processing. Springer, pp 266–275 Hamid IRA, Abawajy J (2011) Hybrid feature selection for phishing email detection. In: International conference on algorithms and architectures for parallel processing. Springer, pp 266–275
5.
Zurück zum Zitat Abu-Nimeh S, Nappa D, Wang X, Nair S (2009) Distributed phishing detection by applying variable selection using Bayesian additive regression trees. In: 2009 IEEE international conference on communications. IEEE, pp 1–5 Abu-Nimeh S, Nappa D, Wang X, Nair S (2009) Distributed phishing detection by applying variable selection using Bayesian additive regression trees. In: 2009 IEEE international conference on communications. IEEE, pp 1–5
6.
Zurück zum Zitat Bagui S, Nandi D, Bagui S, White RJ (2019) Classifying phishing email using machine learning and deep learning. In: 2019 International conference on cyber security and protection of digital services (cyber security). IEEE, pp 1–2 Bagui S, Nandi D, Bagui S, White RJ (2019) Classifying phishing email using machine learning and deep learning. In: 2019 International conference on cyber security and protection of digital services (cyber security). IEEE, pp 1–2
7.
Zurück zum Zitat Gansterer WN, Pölz D (2009) E-mail classification for phishing defense. In: European conference on information retrieval. Springer, pp 449–460 Gansterer WN, Pölz D (2009) E-mail classification for phishing defense. In: European conference on information retrieval. Springer, pp 449–460
8.
Zurück zum Zitat Harikrishnan N, Vinayakumar R, Soman K (2018) A machine learning approach towards phishing email detection. In: Proceedings of the anti-phishing pilot at ACM international workshop on security and privacy analytics (IWSPA AP) 2013, pp 455–468 Harikrishnan N, Vinayakumar R, Soman K (2018) A machine learning approach towards phishing email detection. In: Proceedings of the anti-phishing pilot at ACM international workshop on security and privacy analytics (IWSPA AP) 2013, pp 455–468
9.
Zurück zum Zitat Islam R, Abawajy J (2013) A multi-tier phishing detection and filtering approach. J Netw Comput Appl 36(1):324–335CrossRef Islam R, Abawajy J (2013) A multi-tier phishing detection and filtering approach. J Netw Comput Appl 36(1):324–335CrossRef
10.
Zurück zum Zitat Khonji M, Iraqi Y, Jones A (2012) Enhancing phishing e-mail classifiers: a lexical url analysis approach. Int J Inf Secur Res (IJISR) 2(1/2):40 Khonji M, Iraqi Y, Jones A (2012) Enhancing phishing e-mail classifiers: a lexical url analysis approach. Int J Inf Secur Res (IJISR) 2(1/2):40
11.
Zurück zum Zitat Ma L, Ofoghi B, Watters P, Brown S (2009) Detecting phishing emails using hybrid features. In: 2009 Symposia and workshops on ubiquitous, autonomic and trusted computing. IEEE, pp 493–497 Ma L, Ofoghi B, Watters P, Brown S (2009) Detecting phishing emails using hybrid features. In: 2009 Symposia and workshops on ubiquitous, autonomic and trusted computing. IEEE, pp 493–497
12.
Zurück zum Zitat Nguyen M, Nguyen T, Nguyen TH (2018) A deep learning model with hierarchical lstms and supervised attention for anti-phishing. Preprint at arXiv:1805.01554 Nguyen M, Nguyen T, Nguyen TH (2018) A deep learning model with hierarchical lstms and supervised attention for anti-phishing. Preprint at arXiv:​1805.​01554
13.
Zurück zum Zitat Ra V, HBa BG, Ma AK, KPa S, Poornachandran P, Verma A (2018) Deepanti-phishnet: applying deep neural networks for phishing email detection. In: Proceedings of the 1st AntiPhishing shared pilot 4th ACM international workshop security privacy analysis (IWSPA). Tempe, AZ, USA, pp 1–11 Ra V, HBa BG, Ma AK, KPa S, Poornachandran P, Verma A (2018) Deepanti-phishnet: applying deep neural networks for phishing email detection. In: Proceedings of the 1st AntiPhishing shared pilot 4th ACM international workshop security privacy analysis (IWSPA). Tempe, AZ, USA, pp 1–11
14.
Zurück zum Zitat Smadi S, Aslam N, Zhang L (2018) Detection of online phishing email using dynamic evolving neural network based on reinforcement learning. Decis Support Syst 107:88–102CrossRef Smadi S, Aslam N, Zhang L (2018) Detection of online phishing email using dynamic evolving neural network based on reinforcement learning. Decis Support Syst 107:88–102CrossRef
15.
Zurück zum Zitat Toolan F, Carthy J (2009) Phishing detection using classifier ensembles. In: 2009 eCrime researchers summit. IEEE, pp 1–9 Toolan F, Carthy J (2009) Phishing detection using classifier ensembles. In: 2009 eCrime researchers summit. IEEE, pp 1–9
16.
Zurück zum Zitat Valecha R, Mandaokar P, Rao HR (2021) Phishing email detection using persuasion cues. IEEE Trans Depend Secure Comput Valecha R, Mandaokar P, Rao HR (2021) Phishing email detection using persuasion cues. IEEE Trans Depend Secure Comput
17.
Zurück zum Zitat Somesha M, Pais AR (2022) Classification of phishing email using word embedding and machine learning techniques. J Cyber Secur Mobil:279–320 Somesha M, Pais AR (2022) Classification of phishing email using word embedding and machine learning techniques. J Cyber Secur Mobil:279–320
18.
Zurück zum Zitat Alhogail A, Alsabih A (2021) Applying machine learning and natural language processing to detect phishing email. Comput Secur 110:102414 Alhogail A, Alsabih A (2021) Applying machine learning and natural language processing to detect phishing email. Comput Secur 110:102414
19.
Zurück zum Zitat Bountakas P, Koutroumpouchos K, Xenakis C (2021) A comparison of natural language processing and machine learning methods for phishing email detection. In: The 16th International conference on availability, reliability and security, pp 1–12 Bountakas P, Koutroumpouchos K, Xenakis C (2021) A comparison of natural language processing and machine learning methods for phishing email detection. In: The 16th International conference on availability, reliability and security, pp 1–12
20.
Zurück zum Zitat Castillo E, Dhaduvai S, Liu P, Thakur KS, Dalton A, Strzalkowski T (2020) Email threat detection using distinct neural network approaches. In: Proceedings for the first international workshop on social threats in online conversations: understanding and management, pp 48–55 Castillo E, Dhaduvai S, Liu P, Thakur KS, Dalton A, Strzalkowski T (2020) Email threat detection using distinct neural network approaches. In: Proceedings for the first international workshop on social threats in online conversations: understanding and management, pp 48–55
21.
Zurück zum Zitat Hiransha M, Unnithan NA, Vinayakumar R, Soman K, Verma A (2018) Deep learning based phishing e-mail detection. In: Proceedings of the 1st AntiPhishing shared pilot 4th ACM international workshop security privacy analysis (IWSPA). Tempe, AZ, USA Hiransha M, Unnithan NA, Vinayakumar R, Soman K, Verma A (2018) Deep learning based phishing e-mail detection. In: Proceedings of the 1st AntiPhishing shared pilot 4th ACM international workshop security privacy analysis (IWSPA). Tempe, AZ, USA
22.
Zurück zum Zitat Ramanathan V, Wechsler H (2012) phishgillnet-phishing detection methodology using probabilistic latent semantic analysis, adaboost, and co-training. EURASIP J Inf Secur 2012(1):1–22CrossRef Ramanathan V, Wechsler H (2012) phishgillnet-phishing detection methodology using probabilistic latent semantic analysis, adaboost, and co-training. EURASIP J Inf Secur 2012(1):1–22CrossRef
23.
Zurück zum Zitat Catal C, Giray G, Tekinerdogan B, Kumar S, Shukla S (2022) Applications of deep learning for phishing detection: a systematic literature review. Knowl Inf Syst:1–44 Catal C, Giray G, Tekinerdogan B, Kumar S, Shukla S (2022) Applications of deep learning for phishing detection: a systematic literature review. Knowl Inf Syst:1–44
24.
Zurück zum Zitat Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser Ł, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst:30 Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser Ł, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst:30
25.
Zurück zum Zitat Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert: pre-training of deep bidirectional transformers for language understanding. Preprint at arXiv:1810.04805 Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert: pre-training of deep bidirectional transformers for language understanding. Preprint at arXiv:​1810.​04805
Metadaten
Titel
Phishing Classification Based on Text Content of an Email Body Using Transformers
verfasst von
M. Somesha
Alwyn R. Pais
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-5091-1_25

Premium Partner