Phishing Detection Research Based on LSTM Recurrent Neural Network

In order to effectively detect phishing attacks, this paper designed a new detection system for phishing websites using LSTM Recurrent neural networks. LSTM has the advantage of capturing data timing and long-term dependencies. LSTM has strong learning ability, has strong potential in the face of complex high-dimensional massive data. Experimental results show that this model approach the accuracy of 99.1%, is higher than that of other neural network algorithms.

[1]  Steven C. H. Hoi,et al.  Malicious URL Detection using Machine Learning: A Survey , 2017, ArXiv.

[2]  Farnam Jahanian,et al.  Shades of grey: On the effectiveness of reputation-based “blacklists” , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[3]  Niels Provos,et al.  A framework for detection and measurement of phishing attacks , 2007, WORM '07.

[4]  Xiaotie Deng,et al.  Detection of phishing webpages based on visual similarity , 2005, WWW '05.

[5]  Justin Tung Ma,et al.  Learning to detect malicious URLs , 2011, TIST.

[6]  Carolyn Penstein Rosé,et al.  CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.

[7]  Xiaotie Deng,et al.  Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD) , 2006, IEEE Transactions on Dependable and Secure Computing.

[8]  Lawrence K. Saul,et al.  Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.

[9]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[10]  Xuhua Ding,et al.  Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[11]  Luiz Eduardo Soares de Oliveira,et al.  Obtaining the threat model for e-mail phishing , 2013, Appl. Soft Comput..

[12]  Paul S. Fisher,et al.  Implementation of framework to identify potential phishing websites , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[13]  Heejo Lee,et al.  Detecting Malicious Web Links and Identifying Their Attack Types , 2011, WebApps.

[14]  B.H.M. Sadeghi,et al.  A BP-neural network predictor model for plastic injection molding process , 2000 .

[15]  Amir Herzberg,et al.  Security and identification indicators for browsers against spoofing and phishing attacks , 2008, TOIT.

[16]  Lawrence K. Saul,et al.  Identifying suspicious URLs: an application of large-scale online learning , 2009, ICML '09.

[17]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.