Detection of online phishing email using dynamic evolving neural network based on reinforcement learning

作者: Sami Smadi , Nauman Aslam , Li Zhang

DOI: 10.1016/J.DSS.2018.01.001

关键词:

摘要: Abstract Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for the detection systems in online mode which leading loopholes web-based transactions. In this research, novel framework proposed combines neural network with reinforcement learning attacks first time. The model has ability adapt itself produce new email system that reflects changes newly explored behaviours, accomplished by adopting idea enhance dynamically over solves problem limited dataset automatically adding more emails offline mode. A algorithm explore any behaviours dataset. Through rigorous testing using well-known data sets, we demonstrate technique can handle zero-day high performance levels achieving accuracy, TPR, and TNR at 98.63%, 99.07%, 98.19% respectively. addition, it shows low FPR FNR, 1.81% 0.93% Comparison other similar techniques on same outperforms existing methods.

参考文章(42)
Bin Li, J Friedman, R Olshen, C Stone, Classification and Regression Trees (CART) Springer, Cham. pp. 1- 65 ,(2008) , 10.1007/978-0-387-77501-2_3
Eugene J. Koontz, Jonathan J. Oliver, Christine E. Drake, Anatomy of a Phishing Email. conference on email and anti-spam. ,(2004)
Anna Kang, Jae Dong Lee, Won Min Kang, Leonard Barolli, Jong Hyuk Park, Security Considerations for Smart Phone Smishing Attacks Springer, Berlin, Heidelberg. pp. 467- 473 ,(2014) , 10.1007/978-3-642-41674-3_66
Rami Mohammad, Fadi Thabtah, TL McCluskey, None, Tutorial and critical analysis of phishing websites methods Computer Science Review. ,vol. 17, pp. 1- 24 ,(2015) , 10.1016/J.COSREV.2015.04.001
Isredza Rahmi A. Hamid, Jemal Abawajy, Hybrid feature selection for phishing email detection international conference on algorithms and architectures for parallel processing. pp. 266- 275 ,(2011) , 10.1007/978-3-642-24669-2_26
Andy Adler, Michael E. Schuckers, Calculation of a composite DET curve Lecture Notes in Computer Science. pp. 860- 868 ,(2005) , 10.1007/11527923_90
Wilfried N. Gansterer, David Pölz, E-Mail Classification for Phishing Defense Lecture Notes in Computer Science. pp. 449- 460 ,(2009) , 10.1007/978-3-642-00958-7_40
Charu C Aggarwal, None, Data Streams: Models and Algorithms Springer Publishing Company, Incorporated. ,(2014)
Lutz Prechelt, Early Stopping-But When? neural information processing systems. pp. 55- 69 ,(1998) , 10.1007/978-3-642-35289-8_5