Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical li...
详细信息
ISBN:
(纸本)9798350367904
Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical limitations in dealing with evolving tactics and new phishing schemes. Some of these approaches fail to cope with the temporal and visual patterns of phishing sites, which are crucial for timely and accurate detection. To overcome these difficulties, this work introduces a hybrid AI-based phishing website detection model that utilizes several machine learning and deep learning techniques to improve the accuracy of the detection and remove false positives. The proposed model uses LSTM networks, Genetic Algorithms, Random Forest, and CNN through the stacking ensemble framework. Since LSTM is adopted to capture the temporal dependencies in the website traffic and user interaction patterns, this model can effectively model their phishing behavior over time. GA is used for bioinspired feature selection to reduce the dimensionality of features while optimizing model performance. Random Forest is used as a base layer addressing structured features like URL characteristics and WHOIS information. CNNs are incorporated to extract feature content from a webpage and images that carry various visual indicators often used in phishing attacks including counterfeit logos or banners. A meta-classifier is then used to combine the outputs of LSTMs, CNN, and RF and generate the final classification to boost the detection rate. The proposed hybrid model surpasses the existing techniques and facilitates the analysis of temporal, visual, and structured data, making the detection considerably more accurate. Achieving accuracy of as much as 96-97% and having an AUC of 0.97 with a false positive rate below 3%, the model then impacts the more powerful and more flexible phishing detection system, which is then capable of being more protective against higher sophisticated phishing te
To enhance the capabilities of advanced video coding for emerging applications, the AVS3 standard has been introduced to double the coding efficiency compared to its predecessor, the AVS2 standard. It incorporates sop...
详细信息
Agricultural industry has grown significantly bring sustainable farming practices in improving the food quality, enhancing agricultural productivity and global food security. However, the crop yield and its quality ar...
详细信息
Authentication in the digital world has become a challenging and difficult task. The username-password combination is no longer reliable and the tools that support authentication mechanism are all breakable. In additi...
详细信息
Advances in medical science have led to a better understanding of Alzheimer's disease (AD), as shown by the clear description of AD using numerical, medical and MRI architectural imagery details. Early diagnosis o...
详细信息
Lung cancer is the most deadly illness for patients, and it is an incurable condition. Patient survival rates are greatly increased by early cancer prognosis and identification. The Computed Tomography (CT) scan is an...
详细信息
Deep learning and transfer learning are extremely important in the internet sector and the health care industry. Face recognition technology is essential in practically every industry in our digital age. Several impro...
详细信息
The advancements in technology help in analyzing and predicting the disease of human life using automation. Out of various technologies, Machine Learning (ML) and Deep learning (DL) provide some promising results to h...
详细信息
Authentication in modern era, has evolved significantly to address the increasing complexity and security challenges of our digital world. Traditional methods of authentication, such as passwords and PINS have proven ...
详细信息
In the age of smart era, usage of IoT devices is inevitable. As the number of IoT devices increases, the amount of data they generate also increases, which in turn leads to security breaches. Continuous monitoring thr...
详细信息
暂无评论