Abstract
Developing technologies over digitalization have become more popular and become a threat to society and cybersecurity. Generally, the phishing method is used by hackers to access the data without the influence of users whose data was stolen. Several techniques are used to detect whether the data is phished or non-phished. Some anti-phishing software is used to identify the phishing data. However, few of these techniques did not provide efficient performance. Hence, the proposed model is introduced to overcome the issues obtained and improve the efficiency of detecting whether the data is phished or non-phished. The data is gathered from the Phishstorm dataset, which is pre-processed using the Z score normalization method and data cleaning. Data balancing is done by the Advanced synthetic sampling approach (Adv-SyN) to balance the dataset, and the features are extracted using a Double self-sparse autoencoder (DSelSa). The Opposition Gazelle optimization algorithm (OpGoA) model is used for optimal feature selection, and finally, the data is classified using Multi Head Depth wise Tern integrated long short term memory (MDepthNet). The sooty tern optimization is used to evaluate the loss function of the network model. The performance of the proposed model is analyzed based on some evaluation metrics and compared with other models, which describes the efficiency of the proposed model. The main objective of proposed technique used to detect the phishing attack and phishing or non-phishing. An automated DL methodology introduced for effective detection of phishing attacks for enhancing the cyber security. The accuracy of the proposed model is obtained as 99.45%, and Precision is 99.45%. RMSE and MSE rate of the proposed model is reduced to 0.73 and 0.05 for better performance.
Similar content being viewed by others
Data availability
The entire implementations of the work will be carried out in Python platform. The performance metrics like Accuracy, precision, recall, F1 score and so on, will be examined for the phishing attack detection through deep learning methodologies. Furthermore, the performances will be compared with different existing approaches for enhanced analysis.The data that support this finding of this study are openly available at the following URL/DOI: Phishstorm dataset: https://research.aalto.fi/en/datasets/phishstorm-phishing-legitimate-url-dataset.
Code availability
The code that supports this finding of this study are openly available at the following URL/DOI: https://github.com/Anilyamarthy/Code.git.
References
Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z., Kifayat, K.: A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76, 139–154 (2021)
Wu, Y., Wei, D., Feng, J.: Network attacks detection methods based on deep learning techniques: a survey. Secur. Commun. Netw. 2020, 1–17 (2020)
Singh, S., Singh, M.P., Pandey, R.: Phishing detection from URLs using deep learning approach. In: 2020 5th International Conference on Computing, Communication and Security (ICCCS), pp. 1–4. IEEE (2020)
Akinyelu, A.A., Adewumi, A.O.: Classification of phishing email using random forest machine learning technique. J. Appl. Math. (2014)
Ali, W., Ahmed, A.A.: Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. IET Inf. Secur. 13(6), 659–669 (2019)
Alam, M.N., Sarma, D., Lima, F.F., Saha, I., Hossain, S.: Phishing attacks detection using machine learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1173–1179. IEEE (2020)
Vinayakumar, R., Barathi Ganesh, H.B., Anand Kumar, M., Soman, K.P.: DeepAnti-PhishNet: applying deep neural networks for phishing email detection. In: CEN-AISecurity@ IWSPA, pp. 40–50 (2018)
Rathee, D., Mann, S.: Detection of E-mail phishing attacks—using machine learning and deep learning. Int. J. Comput. Appl. 183(1), 7 (2022)
Basnet, R., Mukkamala, S., Sung, A.H.: Detection of phishing attacks: a machine learning approach. In: Soft Computing Applications in Industry, pp. 373–383. Springer, Berlin (2008)
Adebowale, M.A., Lwin, K.T., Hossain, M.A.: Intelligent phishing detection scheme using deep learning algorithms. J. Enterp. Inf. Manag. 36(3), 747–766 (2023)
Almseidin, M., Zuraiq, A.A. Al-Kasassbeh, M., Alnidami, N.: Phishing detection based on machine learning and feature selection methods. 171–183 (2019)
Ozcan, A., Catal, C., Donmez, E., Senturk, B.: A hybrid DNN–LSTM model for detecting phishing URLs. Neural Comput. Appl. 1–17 (2021)
Sarker, I.H.: Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Comput. Sci. 2(3), 154 (2021)
Sadiq, A., Anwar, M., Butt, R.A., Masud, F., Shahzad, M.K., Naseem, S., Younas, M.: A review of phishing attacks and countermeasures for internet of things-based smart business applications in industry 4.0. Hum. Behav. Emerg. Technol. 3(5), 854–864 (2021)
Saha, I., Sarma, D., Chakma, R.J., Alam, M.N., Sultana, A., Hossain, S.: Phishing attacks detection using deep learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1180–1185. IEEE (2020)
Saha, I., Sarma, D., Chakma, R.J., Alam, M.N., Sultana, A., Hossain, S.: Phishing attacks detection using deep learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, pp. 1180–1185 (2020) https://doi.org/10.1109/ICSSIT48917.2020.9214132
Zabihimayvan, M., Doran, D.: Fuzzy rough set feature selection to enhance phishing attack detection. In: 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–6. IEEE (2019)
Salahdine, F., El Mrabet, Z., Kaabouch, N.: Phishing attacks detection a machine learning-based approach. In: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0250–0255. IEEE (2021)
Bu, S. J., Cho, S. B.: Integrating deep learning with first-order logic programmed constraints for zero-day phishing attack detection. In: ICASSP 2021–2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2685–2689. IEEE (2021)
Oña, D., Zapata, L., Fuertes, W., Rodríguez, G., Benavides, E., Toulkeridis, T.: Phishing attacks: detecting and preventing infected e-mails using machine learning methods. In: 2019 3rd Cyber Security in Networking Conference (CSNet), pp. 161–163. IEEE (2019)
Kumar, P.P., Jaya, T., Rajendran, V.: SI-BBA—a novel phishing website detection based on Swarm intelligence with deep learning. Mater. Today 80, 3129–3139 (2023)
Benavides-Astudillo, E., Fuertes, W., Sanchez-Gordon, S., Nuñez-Agurto, D., Rodríguez-Galán, G.: A phishing-attack-detection model using natural language processing and deep learning. Appl. Sci. 13(9), 5275 (2023)
Buber, E., Diri, B., Sahingoz, O.K.: NLP based phishing attack detection from URLs. In: Intelligent Systems Design and Applications: 17th International Conference on Intelligent Systems Design and Applications (ISDA 2017) held in Delhi, India, December 14–16, pp. 608–618 (2018). Springer, New York.
Mughaid, A., AlZu’bi, S., Hnaif, A., Taamneh, S., Alnajjar, A., Elsoud, E.A.: An intelligent cyber security phishing detection system using deep learning techniques. Clust. Comput. 25(6), 3819–3828 (2022)
Butt, U.A., Amin, R., Aldabbas, H., Mohan, S., Alouffi, B., Ahmadian, A.: Cloud-based email phishing attack using machine and deep learning algorithm. Complex Intell. Syst. 9(3), 3043–3070 (2023)
Ariyadasa, S., Fernando, S., Fernando, S.: Detecting phishing attacks using a combined model of LSTM and CNN. Int. J. Adv. Appl. Sci 7(7), 56–67 (2020)
Opara, C., Wei, B., Chen, Y.: HTMLPhish: Enabling phishing web page detection by applying deep learning techniques on HTML analysis. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2020)
Balogun, A.O., Akande, N.O., Usman-Hamza, F.E., Adeyemo, V.E., Mabayoje, M.A., Ameen, A.O.:. Rotation forest-based logistic model tree for website phishing detection. In: Computational Science and Its Applications–ICCSA 2021: 21st International Conference, Cagliari, Italy, September 13–16, 2021, Proceedings, Part IX 21, pp. 154–169. Springer, New York (2021)
Kumar, Y., Subba, B.: A lightweight machine learning based security framework for detecting phishing attacks. In: 2021 International Conference on Communication Systems & Networks (COMSNETS), pp. 184–188. IEEE (2021)
Ames, H., Glenton, C., Lewin, S.: Purposive sampling in a qualitative evidence synthesis: a worked example from a synthesis on parental perceptions of vaccination communication. BMC Med. Res. Methodol. 19(1), 1–9 (2019)
Wang, S.H., Zhang, X., Zhang, Y.D.: DSSAE: Deep stacked sparse autoencoder analytical model for COVID-19 diagnosis by fractional Fourier entropy. ACM Trans. Manag. Inf. Syst. 13(1), 1–20 (2021)
Ekinci, S., Izci, D.: Enhancing IIR system identification: harnessing the synergy of gazelle optimization and simulated annealing algorithms. e-Prime-Adv. Electr. Eng. Electron. Energy 5, 100225 (2023)
Baniata, L.H., Kang, S., Ampomah, I.K.: A reverse positional encoding multi-head attention-based neural machine translation model for arabic dialects. Mathematics 10(19), 3666 (2022)
Saleem, M.A., Le Thien, N., Asdornwised, W., Chaitusaney, S., Javeed, A., Benjapolakul, W.: Sooty tern optimization algorithm-based deep learning model for diagnosing NSCLC tumours. Sensors 23(4), 2147 (2023)
Acknowledgements
We declare that this manuscript is original, has not been published before and is not currently being considered for publication elsewhere.
Funding
No Funding was received.
Author information
Authors and Affiliations
Contributions
Anil Kumar Yamarthy: Conceptualization, Data Curation, Formal Analysis, Investigation, Resources, Software, Writing original draft. Ch Koteswararao: Methodology, Project administration, Supervision, Validation, Visualization, Writing-Review&editing, Funding acquisition.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Informed consent
The author and co-author are well aware about publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yamarthy, A.K., Koteswararao, C. MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04313-w
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10586-024-04313-w