Ai-Powered Phishing Detection And Prevention

Oladimeji Azeez Lamina, Waliu Adebayo Ayuba, Olubukola Eunice Adebiyi, Gracious Ebunoluwa Michael, Ojo-Omoniyi Damilola Samuel, Keshinro Olushola Samuel

Abstract

Phishing attacks, which involve deceitful attempts to acquire sensitive information by impersonating a trustworthy entity, have become increasingly sophisticated and widespread. Traditional phishing detection methods typically rely on heuristic or signature-based techniques, which may struggle to adapt to the evolving tactics employed by attackers. This paper examines the role of artificial intelligence (AI) in enhancing phishing detection systems. AI-driven approaches utilise machine learning algorithms, natural language processing, and pattern recognition to identify and mitigate phishing threats with improved accuracy and efficiency. By analysing large datasets, our systems uncover subtle patterns and anomalies indicative of phishing attempts that conventional methods might miss. We also discuss various AI methodologies in phishing detection, including supervised and unsupervised learning techniques, ensemble methods, and deep learning models. Furthermore, we evaluate the effectiveness of AI-driven systems in real-world scenarios and their ability to adapt to new phishing strategies. Our paper concludes with a discussion of current challenges and future research directions in this field, highlighting the necessity for ongoing advancements to tackle the dynamic nature of phishing threats.



Keywords


Phishing Detection; Artificial Intelligence; Machine Learning; Natural Language Processing; Pattern Recognition; Deep Learning

Full Text:

PDF


References


1. Bitaab, M., Cho, H., Oest, A., Zhang, P., Sun, Z., Pourmohamad, R., Kim, D., Bao, T., Wang, R., Shoshitaishvili, Y., Doupe, A., & Ahn, G. (2020). Scam Pandemic: How attackers exploit public fear through phishing. Conference: 2020 APWG Symposium on Electronic Crime Research (eCrime). doi: 10.1109/ecrime51433.2020.9493260

2. Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2010). The Effect of online privacy information on purchasing behaviour: an experimental study. Information Systems Research, 22(2), 254–268. doi: 10.1287/isre.1090.0260

3. Rao, R. S., & Pais, A. R. (2018). Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications, 31(8), 3851–3873. doi: 10.1007/s00521-017-3305-0

4. Verma, R., & Hossain, N. (2014). Semantic Feature Selection for Text with Application to Phishing Email Detection. In Lecture notes in computer science, 455–468. doi: 10.1007/978-3-319-12160-4_27

5. Bergholz, A., De Beer, J., Glahn, S., Moens, M., Paaß, G., & Strobel, S. (2010). New filtering approaches for phishing email. Journal of Computer Security, 18(1), 7–35. doi: 10.3233/jcs-2010-0371

6. Abdelhamid, N., Ayesh, A., & Thabtah, F. (2014). Phishing detection-based Associative Classification data mining. Expert Systems With Applications, 41(13), 5948–5959. doi: 10.1016/j.eswa.2014.03.019

7. Moubayed, A., Injadat, M., Nassif, A. B., Lutfiyya, H., & Shami, A. (2018). E-Learning: Challenges and Research Opportunities Using Machine Learning & Data Analytics. IEEE Access, 6, 39117–39138. doi: 10.1109/access.2018.2851790

8. Bahnsen, A. C., Torroledo, I., Camacho, L. D., & Villegas, S. (2018). DeepPhish: Simulating Malicious AI. Retrieved from https://albahnsen.wordpress.com/wp-content/uploads/2018/05/deepphish-simulating-malicious-ai_submitted.pdf

9. Borate, N. M. V., Adsul, N. D. A., Dhakane, N. M. R., Gawade, N. M. S., Ghodake, N. M. S., & Jadhav, N. M. P. (2024). A comprehensive review of phishing attack detection using machine learning techniques. International Journal of Advanced Research in Science Communication and Technology, 435–441. doi: 10.48175/ijarsct-19963

10. Yuan, C., Xiao, S. S., Geng, C. X. et al. (2021). Digital Transformation and Enterprise Division of Labor: Specialisation or Vertical Integration. China Industrial Economics, 9, 137-155.

11. Karim, A., Shahroz, M., Mustofa, K., Belhaouari, S. B., & Joga, S. R. K. (2023). Phishing detection system through hybrid machine learning based on URL. IEEE Access, 11, 36805–36822. doi: 10.1109/access.2023.3252366

12. Atawneh, S., & Aljehani, H. (2023). Phishing email detection model using Deep learning. Electronics, 12(20), 4261. doi: 10.3390/electronics12204261

13. Devlin, J., Chang, M., Lee, K., & Toutanova, K. (2018). BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv (Cornell University). doi: 10.48550/arxiv.1810.04805

14. Alsubaei, F. S., Almazroi, A. A., & Ayub, N. (2024). Enhancing Phishing Detection: A novel hybrid deep learning framework for cybercrime forensics. IEEE Access, 12, 8373–8389. doi: 10.1109/access.2024.3351946

15. Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2018). Machine learning-based phishing detection from URLs. Expert Systems With Applications, 117, 345–357. doi: 10.1016/j.eswa.2018.09.029

16. Biggio, B., & Roli, F. (2018). Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. Conference: ACM SIGSAC Conference.

17. Mohammad, R. M., Thabtah, F., & McCluskey, L. (2015). Predicting phishing websites based on a self-structuring neural network. Neural Computing and Applications, 25(2), 443-458

18. Fares, H., Kilani, J., Fagroud, F., Toumi, H., Lakrami, F., Baddi, Y., & Aknin, N. (2024). Machine learning approach for email phishing detection. Procedia Computer Science, 251, 746–751. doi: 10.1016/j.procs.2024.11.179

19. Guptta, S. D., Shahriar, K. T., Alqahtani, H., Alsalman, D., & Sarker, I. H. (2022). Modelling hybrid Feature-Based phishing website detection using machine learning techniques. Annals of Data Science, 11(1), 217–242. doi: 10.1007/s40745-022-00379-8


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Refbacks

  • There are currently no refbacks.




Copyright (c) 2024 Oladimeji Azeez Lamina, Waliu Adebayo Ayuba, Olubukola Eunice, Adebiyi 3, ⁠Gracious Ebunoluwa Michael, Ojo-Omoniyi Damilola Samuel, Keshinro Olushola Samuel

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.