Phishing detection leveraging machine learning and deep learning: A review

DM Divakaran, A Oest - IEEE Security & Privacy, 2022 - ieeexplore.ieee.org
Phishing attacks trick victims into disclosing sensitive information. To counter them, we
explore machine learning and deep learning models leveraging large-scale data. We …

Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages

Y Lin, R Liu, DM Divakaran, JY Ng, QZ Chan… - 30th USENIX Security …, 2021 - usenix.org
Recent years have seen the development of phishing detection and identification
approaches to defend against phishing attacks. Phishing detection solutions often report …

[HTML][HTML] The applicability of a hybrid framework for automated phishing detection

RJ van Geest, G Cascavilla, J Hulstijn, N Zannone - Computers & Security, 2024 - Elsevier
Phishing attacks are a critical and escalating cybersecurity threat in the modern digital
landscape. As cybercriminals continually adapt their techniques, automated phishing …

Markov chain monte carlo-based machine unlearning: Unlearning what needs to be forgotten

QP Nguyen, R Oikawa, DM Divakaran… - Proceedings of the …, 2022 - dl.acm.org
As the use of machine learning (ML) models is becoming increasingly popular in many real-
world applications, there are practical challenges that need to be addressed for model …

Spacephish: The evasion-space of adversarial attacks against phishing website detectors using machine learning

G Apruzzese, M Conti, Y Yuan - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …

D-fence: A flexible, efficient, and comprehensive phishing email detection system

J Lee, F Tang, P Ye, F Abbasi, P Hay… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Phishing continues to be a major security concern for organizations around the globe. Past
works proposed classifiers to detect phishing emails; however many of them are based on …

Attacking logo-based phishing website detectors with adversarial perturbations

J Lee, Z Xin, MNP See, K Sabharwal… - … on Research in …, 2023 - Springer
Recent times have witnessed the rise of anti-phishing schemes powered by deep learning
(DL). In particular, logo-based phishing detectors rely on DL models from Computer Vision …

IoT security vulnerabilities and defensive measures in Industry 4.0

K Manasa, LMI Leo Joseph - Artificial Intelligence and Cyber Security in …, 2023 - Springer
Abstract The Internet of things (IoT) has been emerging technology for the past decade. IoT
can be defined as the network connecting objects to the Internet in the physical world. IoT …

Phishing webpage detection based on global and local visual similarity

M Wang, L Song, L Li, Y Zhu, J Li - Expert Systems with Applications, 2024 - Elsevier
In recent years, phishing websites have constantly evolved, causing traditional URL or
HTML-based detection methods less effective. This limitation motivated the development of …

[PDF][PDF] Rescan: A middleware framework for realistic and robust black-box web application scanning

K Drakonakis, S Ioannidis, J Polakis - Network and Distributed System …, 2023 - par.nsf.gov
ÐBlack-box web vulnerability scanners are invaluable for security researchers and
practitioners. Despite recent approaches tackling some of the inherent limitations of …