Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks

作者: Syed Hasan Amin Mahmood , Syed Mustafa Ali Abbasi , Ahmed Abbasi , Fareed Zaffar

DOI: 10.1109/ISI49825.2020.9280509

关键词:

摘要: Phishing attacks remain pervasive and continue to be a source of significant monetary loss, identity theft, malware. One the challenges is that in most organizational settings, detection paradigm inherently about identifying reacting threats real-time, as they are unfolding. As way complement these efforts with greater foresight, we introduce idea phishcasting — forecasting phishing threat levels weeks or months into future. Given attack volume time series data noisy devoid traditional seasonal cyclical trends, extend framework utilize multiple series, auxiliary information alternate representations. We also CoT-Net, flexible, end-to-end CNN-LSTM based deep learning method for complex series. CoT-Net uses embeddings uncover correlations between patterns within across industry sectors. Using publicly available test bed featuring organizations’ over time, find outperform state-of-the-art methods. By showing might possible practical, our work has important proactive implications cybersecurity.

参考文章(20)
Fatemeh Zahedi, , Ahmed Abbasi, Yan Chen, , , Fake-Website Detection Tools: Identifying Elements That Promote Individuals' Use and Enhance Their Performance Journal of the Association for Information Systems. ,vol. 16, pp. 2- ,(2015) , 10.17705/1JAIS.00399
Yan Chen, Fatemeh Zahedi, Ahmed Abbasi, Interface design elements for anti-phishing systems DESRIST'11 Proceedings of the 6th international conference on Service-oriented perspectives in design science research. pp. 253- 265 ,(2011) , 10.1007/978-3-642-20633-7_18
S.L Ho, M Xie, T.N Goh, A comparative study of neural network and Box-Jenkins ARIMA modeling in time series prediction annual conference on computers. ,vol. 42, pp. 371- 375 ,(2002) , 10.1016/S0360-8352(02)00036-0
Rachna Dhamija, J. D. Tygar, The battle against phishing: Dynamic Security Skins symposium on usable privacy and security. pp. 77- 88 ,(2005) , 10.1145/1073001.1073009
Ahmed Abbasi, Fatemeh “Mariam” Zahedi, Daniel Zeng, Yan Chen, Hsinchun Chen, Jay F. Nunamaker, Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information Journal of Management Information Systems. ,vol. 31, pp. 109- 157 ,(2015) , 10.1080/07421222.2014.1001260
Bruce Schneier, Inside risks: semantic network attacks Communications of the ACM. ,vol. 43, pp. 168- ,(2000) , 10.1145/355112.355131
Haijun Zhang, Gang Liu, Tommy W. S. Chow, Wenyin Liu, Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach IEEE Transactions on Neural Networks. ,vol. 22, pp. 1532- 1546 ,(2011) , 10.1109/TNN.2011.2161999
Ahmed Abbasi, , Suprateek Sarker, Roger Chiang, , , , Big Data Research in Information Systems: Toward an Inclusive Research Agenda Journal of the Association for Information Systems. ,vol. 17, pp. 3- ,(2016) , 10.17705/1JAIS.00423
Ahmed Abbasi, F. Mariam Zahedi, Yan Chen, Phishing susceptibility: The good, the bad, and the ugly intelligence and security informatics. pp. 169- 174 ,(2016) , 10.1109/ISI.2016.7745462
David G. Dobolyi, Ahmed Abbasi, PhishMonger: A free and open source public archive of real-world phishing websites intelligence and security informatics. pp. 31- 36 ,(2016) , 10.1109/ISI.2016.7745439