Skip to main content
Log in

MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Developing technologies over digitalization have become more popular and become a threat to society and cybersecurity. Generally, the phishing method is used by hackers to access the data without the influence of users whose data was stolen. Several techniques are used to detect whether the data is phished or non-phished. Some anti-phishing software is used to identify the phishing data. However, few of these techniques did not provide efficient performance. Hence, the proposed model is introduced to overcome the issues obtained and improve the efficiency of detecting whether the data is phished or non-phished. The data is gathered from the Phishstorm dataset, which is pre-processed using the Z score normalization method and data cleaning. Data balancing is done by the Advanced synthetic sampling approach (Adv-SyN) to balance the dataset, and the features are extracted using a Double self-sparse autoencoder (DSelSa). The Opposition Gazelle optimization algorithm (OpGoA) model is used for optimal feature selection, and finally, the data is classified using Multi Head Depth wise Tern integrated long short term memory (MDepthNet). The sooty tern optimization is used to evaluate the loss function of the network model. The performance of the proposed model is analyzed based on some evaluation metrics and compared with other models, which describes the efficiency of the proposed model. The main objective of proposed technique used to detect the phishing attack and phishing or non-phishing. An automated DL methodology introduced for effective detection of phishing attacks for enhancing the cyber security. The accuracy of the proposed model is obtained as 99.45%, and Precision is 99.45%. RMSE and MSE rate of the proposed model is reduced to 0.73 and 0.05 for better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

The entire implementations of the work will be carried out in Python platform. The performance metrics like Accuracy, precision, recall, F1 score and so on, will be examined for the phishing attack detection through deep learning methodologies. Furthermore, the performances will be compared with different existing approaches for enhanced analysis.The data that support this finding of this study are openly available at the following URL/DOI: Phishstorm dataset: https://research.aalto.fi/en/datasets/phishstorm-phishing-legitimate-url-dataset.

Code availability

The code that supports this finding of this study are openly available at the following URL/DOI: https://github.com/Anilyamarthy/Code.git.

References

  1. Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z., Kifayat, K.: A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76, 139–154 (2021)

    Article  PubMed  Google Scholar 

  2. Wu, Y., Wei, D., Feng, J.: Network attacks detection methods based on deep learning techniques: a survey. Secur. Commun. Netw. 2020, 1–17 (2020)

    CAS  Google Scholar 

  3. Singh, S., Singh, M.P., Pandey, R.: Phishing detection from URLs using deep learning approach. In: 2020 5th International Conference on Computing, Communication and Security (ICCCS), pp. 1–4. IEEE (2020)

  4. Akinyelu, A.A., Adewumi, A.O.: Classification of phishing email using random forest machine learning technique. J. Appl. Math. (2014)

  5. Ali, W., Ahmed, A.A.: Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. IET Inf. Secur. 13(6), 659–669 (2019)

    Article  Google Scholar 

  6. Alam, M.N., Sarma, D., Lima, F.F., Saha, I., Hossain, S.: Phishing attacks detection using machine learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1173–1179. IEEE (2020)

  7. Vinayakumar, R., Barathi Ganesh, H.B., Anand Kumar, M., Soman, K.P.: DeepAnti-PhishNet: applying deep neural networks for phishing email detection. In: CEN-AISecurity@ IWSPA, pp. 40–50 (2018)

  8. Rathee, D., Mann, S.: Detection of E-mail phishing attacks—using machine learning and deep learning. Int. J. Comput. Appl. 183(1), 7 (2022)

    Google Scholar 

  9. Basnet, R., Mukkamala, S., Sung, A.H.: Detection of phishing attacks: a machine learning approach. In: Soft Computing Applications in Industry, pp. 373–383. Springer, Berlin (2008)

  10. Adebowale, M.A., Lwin, K.T., Hossain, M.A.: Intelligent phishing detection scheme using deep learning algorithms. J. Enterp. Inf. Manag. 36(3), 747–766 (2023)

    Article  Google Scholar 

  11. Almseidin, M., Zuraiq, A.A. Al-Kasassbeh, M., Alnidami, N.: Phishing detection based on machine learning and feature selection methods. 171–183 (2019)

  12. Ozcan, A., Catal, C., Donmez, E., Senturk, B.: A hybrid DNN–LSTM model for detecting phishing URLs. Neural Comput. Appl. 1–17 (2021)

  13. Sarker, I.H.: Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Comput. Sci. 2(3), 154 (2021)

    Article  Google Scholar 

  14. Sadiq, A., Anwar, M., Butt, R.A., Masud, F., Shahzad, M.K., Naseem, S., Younas, M.: A review of phishing attacks and countermeasures for internet of things-based smart business applications in industry 4.0. Hum. Behav. Emerg. Technol. 3(5), 854–864 (2021)

    Article  Google Scholar 

  15. Saha, I., Sarma, D., Chakma, R.J., Alam, M.N., Sultana, A., Hossain, S.: Phishing attacks detection using deep learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1180–1185. IEEE (2020)

  16. Saha, I., Sarma, D., Chakma, R.J., Alam, M.N., Sultana, A., Hossain, S.: Phishing attacks detection using deep learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, pp. 1180–1185 (2020) https://doi.org/10.1109/ICSSIT48917.2020.9214132

  17. Zabihimayvan, M., Doran, D.: Fuzzy rough set feature selection to enhance phishing attack detection. In: 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–6. IEEE (2019)

  18. Salahdine, F., El Mrabet, Z., Kaabouch, N.: Phishing attacks detection a machine learning-based approach. In: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0250–0255. IEEE (2021)

  19. Bu, S. J., Cho, S. B.: Integrating deep learning with first-order logic programmed constraints for zero-day phishing attack detection. In: ICASSP 2021–2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2685–2689. IEEE (2021)

  20. Oña, D., Zapata, L., Fuertes, W., Rodríguez, G., Benavides, E., Toulkeridis, T.: Phishing attacks: detecting and preventing infected e-mails using machine learning methods. In: 2019 3rd Cyber Security in Networking Conference (CSNet), pp. 161–163. IEEE (2019)

  21. Kumar, P.P., Jaya, T., Rajendran, V.: SI-BBA—a novel phishing website detection based on Swarm intelligence with deep learning. Mater. Today 80, 3129–3139 (2023)

    Google Scholar 

  22. Benavides-Astudillo, E., Fuertes, W., Sanchez-Gordon, S., Nuñez-Agurto, D., Rodríguez-Galán, G.: A phishing-attack-detection model using natural language processing and deep learning. Appl. Sci. 13(9), 5275 (2023)

    Article  CAS  Google Scholar 

  23. Buber, E., Diri, B., Sahingoz, O.K.: NLP based phishing attack detection from URLs. In: Intelligent Systems Design and Applications: 17th International Conference on Intelligent Systems Design and Applications (ISDA 2017) held in Delhi, India, December 14–16, pp. 608–618 (2018). Springer, New York.

  24. Mughaid, A., AlZu’bi, S., Hnaif, A., Taamneh, S., Alnajjar, A., Elsoud, E.A.: An intelligent cyber security phishing detection system using deep learning techniques. Clust. Comput. 25(6), 3819–3828 (2022)

    Article  Google Scholar 

  25. Butt, U.A., Amin, R., Aldabbas, H., Mohan, S., Alouffi, B., Ahmadian, A.: Cloud-based email phishing attack using machine and deep learning algorithm. Complex Intell. Syst. 9(3), 3043–3070 (2023)

    Article  Google Scholar 

  26. Ariyadasa, S., Fernando, S., Fernando, S.: Detecting phishing attacks using a combined model of LSTM and CNN. Int. J. Adv. Appl. Sci 7(7), 56–67 (2020)

    Article  Google Scholar 

  27. Opara, C., Wei, B., Chen, Y.: HTMLPhish: Enabling phishing web page detection by applying deep learning techniques on HTML analysis. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2020)

  28. Balogun, A.O., Akande, N.O., Usman-Hamza, F.E., Adeyemo, V.E., Mabayoje, M.A., Ameen, A.O.:. Rotation forest-based logistic model tree for website phishing detection. In: Computational Science and Its Applications–ICCSA 2021: 21st International Conference, Cagliari, Italy, September 13–16, 2021, Proceedings, Part IX 21, pp. 154–169. Springer, New York (2021)

  29. Kumar, Y., Subba, B.: A lightweight machine learning based security framework for detecting phishing attacks. In: 2021 International Conference on Communication Systems & Networks (COMSNETS), pp. 184–188. IEEE (2021)

  30. Ames, H., Glenton, C., Lewin, S.: Purposive sampling in a qualitative evidence synthesis: a worked example from a synthesis on parental perceptions of vaccination communication. BMC Med. Res. Methodol. 19(1), 1–9 (2019)

    Article  Google Scholar 

  31. Wang, S.H., Zhang, X., Zhang, Y.D.: DSSAE: Deep stacked sparse autoencoder analytical model for COVID-19 diagnosis by fractional Fourier entropy. ACM Trans. Manag. Inf. Syst. 13(1), 1–20 (2021)

    Article  Google Scholar 

  32. Ekinci, S., Izci, D.: Enhancing IIR system identification: harnessing the synergy of gazelle optimization and simulated annealing algorithms. e-Prime-Adv. Electr. Eng. Electron. Energy 5, 100225 (2023)

    Article  Google Scholar 

  33. Baniata, L.H., Kang, S., Ampomah, I.K.: A reverse positional encoding multi-head attention-based neural machine translation model for arabic dialects. Mathematics 10(19), 3666 (2022)

    Article  Google Scholar 

  34. Saleem, M.A., Le Thien, N., Asdornwised, W., Chaitusaney, S., Javeed, A., Benjapolakul, W.: Sooty tern optimization algorithm-based deep learning model for diagnosing NSCLC tumours. Sensors 23(4), 2147 (2023)

    Article  ADS  PubMed  PubMed Central  Google Scholar 

Download references

Acknowledgements

We declare that this manuscript is original, has not been published before and is not currently being considered for publication elsewhere.

Funding

No Funding was received.

Author information

Authors and Affiliations

Authors

Contributions

Anil Kumar Yamarthy: Conceptualization, Data Curation, Formal Analysis, Investigation, Resources, Software, Writing original draft. Ch Koteswararao: Methodology, Project administration, Supervision, Validation, Visualization, Writing-Review&editing, Funding acquisition.

Corresponding author

Correspondence to Ch Koteswararao.

Ethics declarations

Competing interests

The authors declare no competing interests.

Informed consent

The author and co-author are well aware about publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yamarthy, A.K., Koteswararao, C. MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04313-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04313-w

Keywords

Navigation