Skip to main content

2018 | OriginalPaper | Buchkapitel

Phishing Detection Research Based on LSTM Recurrent Neural Network

verfasst von : Wenwu Chen, Wei Zhang, Yang Su

Erschienen in: Data Science

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to effectively detect phishing attacks, this paper designed a new detection system for phishing websites using LSTM Recurrent neural networks. LSTM has the advantage of capturing data timing and long-term dependencies. LSTM has strong learning ability, has strong potential in the face of complex high-dimensional massive data. Experimental results show that this model approach the accuracy of 99.1%, is higher than that of other neural network algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Phishing Activity Trends Report: Phishing Activity Trends Report 1st Half. Methodology (2017) Phishing Activity Trends Report: Phishing Activity Trends Report 1st Half. Methodology (2017)
3.
Zurück zum Zitat Sinha, S., Bailey, M., Jahanian, F.: Shades of grey: on the effectiveness of reputation-based “blacklists”. In: International Conference on Malicious and Unwanted Software, pp. 57–64. IEEE (2008) Sinha, S., Bailey, M., Jahanian, F.: Shades of grey: on the effectiveness of reputation-based “blacklists”. In: International Conference on Malicious and Unwanted Software, pp. 57–64. IEEE (2008)
4.
Zurück zum Zitat Zhang, Y, Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May, pp. 639–648. DBLP (2007) Zhang, Y, Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May, pp. 639–648. DBLP (2007)
5.
Zurück zum Zitat Xiang, G., Hong, J., Rose, C.P., et al.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 21 (2011)CrossRef Xiang, G., Hong, J., Rose, C.P., et al.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 21 (2011)CrossRef
6.
Zurück zum Zitat Wenyin, L., Huang, G., Xiaoyue, L., et al.: Detection of phishing webpages based on visual similarity. In: Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, pp. 1060–1061 (2005) Wenyin, L., Huang, G., Xiaoyue, L., et al.: Detection of phishing webpages based on visual similarity. In: Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, pp. 1060–1061 (2005)
7.
Zurück zum Zitat Ma, J., Saul, L.K., Savage. S., et al.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–July, pp. 1245–1254. DBLP (2009) Ma, J., Saul, L.K., Savage. S., et al.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–July, pp. 1245–1254. DBLP (2009)
8.
Zurück zum Zitat Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Usenix Conference on Web Application Development, p. 11 (2011) Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Usenix Conference on Web Application Development, p. 11 (2011)
9.
Zurück zum Zitat Ma, J., Saul, L.K., Savage, S., et al.: Identifying suspicious URLs: an application of large-scale online learning. In: International Conference on Machine Learning, pp. 681–688. ACM (2009) Ma, J., Saul, L.K., Savage, S., et al.: Identifying suspicious URLs: an application of large-scale online learning. In: International Conference on Machine Learning, pp. 681–688. ACM (2009)
10.
Zurück zum Zitat Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef
11.
Zurück zum Zitat Sadeghi, B.H.M.: A BP-neural network predictor model for plastic injection molding process. J. Mater. Process. Technol. 103(3), 411–416 (2000)MathSciNetCrossRef Sadeghi, B.H.M.: A BP-neural network predictor model for plastic injection molding process. J. Mater. Process. Technol. 103(3), 411–416 (2000)MathSciNetCrossRef
12.
Zurück zum Zitat Ma, J., Saul, L.K., Savage, S., et al.: Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3), 1–24 (2011) Ma, J., Saul, L.K., Savage, S., et al.: Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3), 1–24 (2011)
13.
Zurück zum Zitat Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL detection using machine learning: a survey (2017) Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL detection using machine learning: a survey (2017)
14.
Zurück zum Zitat Kim, D., Achan, C., Baek, J., et al.: Implementation of framework to identify potential phishing websites, p. 268. IEEE (2013) Kim, D., Achan, C., Baek, J., et al.: Implementation of framework to identify potential phishing websites, p. 268. IEEE (2013)
15.
Zurück zum Zitat Garera, S., Provos, N., Chew, M., et al.: A framework for detection and measurement of phishing attacks. In: ACM Workshop on Recurring Malcode, pp. 1–8. ACM (2007) Garera, S., Provos, N., Chew, M., et al.: A framework for detection and measurement of phishing attacks. In: ACM Workshop on Recurring Malcode, pp. 1–8. ACM (2007)
16.
Zurück zum Zitat Olivo, C.K., Santin, A.O., Oliveira, L.S.: Obtaining the threat model for e-mail phishing. Appl. Soft Comput. J. 13(12), 4841–4848 (2013)CrossRef Olivo, C.K., Santin, A.O., Oliveira, L.S.: Obtaining the threat model for e-mail phishing. Appl. Soft Comput. J. 13(12), 4841–4848 (2013)CrossRef
17.
Zurück zum Zitat Herzberg, A., Jbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technol. 8(4), 1–36 (2008)CrossRef Herzberg, A., Jbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technol. 8(4), 1–36 (2008)CrossRef
18.
Zurück zum Zitat Pan, Y., Ding, X.: Anomaly based web phishing page detection. In: 2006 Computer Security Applications Conference, ACSAC 2006, pp. 381–392. IEEE (2006) Pan, Y., Ding, X.: Anomaly based web phishing page detection. In: 2006 Computer Security Applications Conference, ACSAC 2006, pp. 381–392. IEEE (2006)
19.
Zurück zum Zitat Fu, A.Y., Liu, W., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE Trans. Dependable Secur. Comput. 3(4), 301–311 (2006)CrossRef Fu, A.Y., Liu, W., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE Trans. Dependable Secur. Comput. 3(4), 301–311 (2006)CrossRef
Metadaten
Titel
Phishing Detection Research Based on LSTM Recurrent Neural Network
verfasst von
Wenwu Chen
Wei Zhang
Yang Su
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-2203-7_52