Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC IEEE Open Journal of the Communications Society Pub Date : 2024-09-17 DOI:10.1109/OJCOMS.2024.3462503
Shakeel Ahmad;Muhammad Zaman;Ahmad Sami Al-Shamayleh;Rahiel Ahmad;Shafi’I Muhammad Abdulhamid;Ismail Ergen;Adnan Akhunzada
{"title":"Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection","authors":"Shakeel Ahmad;Muhammad Zaman;Ahmad Sami Al-Shamayleh;Rahiel Ahmad;Shafi’I Muhammad Abdulhamid;Ismail Ergen;Adnan Akhunzada","doi":"10.1109/OJCOMS.2024.3462503","DOIUrl":null,"url":null,"abstract":"Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling. Phishing attacks are particularly significant among Web phishing techniques. In a phishing attack, the attacker creates a fake website that closely resembles a legitimate one to deceive users into providing sensitive information. These attacks can be detected using both traditional and modern AI-based models. However, even with state-of-the-art methods, accurately classifying newly emerged links as phishing or legitimate remains a challenge. This study conducts a comparative analysis of more than 130 articles published between 2020 and 2024, identifying challenges and gaps in the literature and comparing the findings of various authors. The novelty of this research lies in providing a roadmap for researchers, practitioners, and cybersecurity experts to navigate the landscape of machine learning (ML) and deep learning (DL) models for phishing detection. The study reviews traditional phishing detection methods, ML and DL models, phishing datasets, and the step-by-step phishing process. It highlights limitations, research gaps, weaknesses, and potential improvements. Accuracy measures are used to compare model performance. In conclusion, this research provides a comprehensive survey of website phishing detection using AI models, offering a new roadmap for future studies.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"2065-2089"},"PeriodicalIF":6.3000,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10681500","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10681500/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling. Phishing attacks are particularly significant among Web phishing techniques. In a phishing attack, the attacker creates a fake website that closely resembles a legitimate one to deceive users into providing sensitive information. These attacks can be detected using both traditional and modern AI-based models. However, even with state-of-the-art methods, accurately classifying newly emerged links as phishing or legitimate remains a challenge. This study conducts a comparative analysis of more than 130 articles published between 2020 and 2024, identifying challenges and gaps in the literature and comparing the findings of various authors. The novelty of this research lies in providing a roadmap for researchers, practitioners, and cybersecurity experts to navigate the landscape of machine learning (ML) and deep learning (DL) models for phishing detection. The study reviews traditional phishing detection methods, ML and DL models, phishing datasets, and the step-by-step phishing process. It highlights limitations, research gaps, weaknesses, and potential improvements. Accuracy measures are used to compare model performance. In conclusion, this research provides a comprehensive survey of website phishing detection using AI models, offering a new roadmap for future studies.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
全面深入评述基于人工智能的网络钓鱼检测模型
互联网的发展增加了与数据保护和网上购物相关的安全风险。有几种技术危及Internet安全性,包括黑客攻击、SQL注入、网络钓鱼攻击和DNS隧道。在网络钓鱼技术中,网络钓鱼攻击尤为重要。在网络钓鱼攻击中,攻击者创建一个与合法网站非常相似的假网站,以欺骗用户提供敏感信息。这些攻击可以使用传统的和现代的基于人工智能的模型来检测。然而,即使使用最先进的方法,准确地将新出现的链接分类为网络钓鱼或合法仍然是一个挑战。本研究对2020年至2024年间发表的130多篇文章进行了比较分析,确定了文献中的挑战和差距,并比较了不同作者的研究结果。这项研究的新颖之处在于为研究人员、从业人员和网络安全专家提供了一个路线图,以导航用于网络钓鱼检测的机器学习(ML)和深度学习(DL)模型。该研究回顾了传统的网络钓鱼检测方法、ML和DL模型、网络钓鱼数据集以及逐步的网络钓鱼过程。它强调了局限性、研究差距、弱点和潜在的改进。精度度量用于比较模型性能。综上所述,本研究对使用AI模型的网站钓鱼检测进行了全面的调查,为未来的研究提供了新的路线图。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
13.70
自引率
3.80%
发文量
94
审稿时长
10 weeks
期刊介绍: The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023. The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include: Systems and network architecture, control and management Protocols, software, and middleware Quality of service, reliability, and security Modulation, detection, coding, and signaling Switching and routing Mobile and portable communications Terminals and other end-user devices Networks for content distribution and distributed computing Communications-based distributed resources control.
期刊最新文献
An Ecosystemic Approach for the Seamless Integration of Terrestrial and Non-Terrestrial Network Connections A QR-Anchored Secure Offloading for Intelligent Transportation Using Planar Graph Modeling Receive Beamforming Schemes to Mitigate Inter-Operator Pilot Contamination in RIS-Aided MIMO Networks Spectrum Sharing for Satellite-Terrestrial Integrated Networks: A Spherical Poisson Hole Process-Based Approach Joint Beamforming Design for Integrated Sensing and Covert Wireless Communication
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1