2019
DOI: 10.1007/978-3-030-22479-0_5
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Sampling Attacks Against Phishing Detection

Abstract: Phishing websites trick users into believing that they are interacting with a legitimate website, and thereby, capture sensitive information, such as user names, passwords, credit card numbers and other personal information. Machine learning appears to be a promising technique for distinguishing between phishing websites and legitimate ones. However, machine learning approaches are susceptible to adversarial learning techniques, which attempt to degrade the accuracy of a trained classifier model. In this work,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 19 publications
0
19
0
Order By: Relevance
“…In this approach, initial network configuration and description of exploits serve as input for the minimal attack graph generation. Shirazi et al [18] present an approach for modeling attack-graph generation and analysis problems as a planning problem. They present a tool called AGBuilder that generates attack graphs using the Planning Domain Definition Language (PDDL) from extracted vulnerability information.…”
Section: Attack Graph Generation Approachesmentioning
confidence: 99%
“…In this approach, initial network configuration and description of exploits serve as input for the minimal attack graph generation. Shirazi et al [18] present an approach for modeling attack-graph generation and analysis problems as a planning problem. They present a tool called AGBuilder that generates attack graphs using the Planning Domain Definition Language (PDDL) from extracted vulnerability information.…”
Section: Attack Graph Generation Approachesmentioning
confidence: 99%
“…Recently a number of authors have proposed and developed adversarial evasion attacks against phishing detection models. Shirazi et al propose an adversarial random sampling attack [46]. They use publicly available datasets where every feature is binned to either -1, 0 or 1; where -1 is a legitimate instance, 0 is suspicious and 1 indicates phishing.…”
Section: Related Workmentioning
confidence: 99%
“…We believe that proposing new techniques to synthesize phishing attempts is quite significant in creating a defensive mechanism that can prevent zero-day phishing attempts. While there are approaches that apply GAN for generating adversarial phishing examples [14], to the best of our knowledge, this is the first work that synthesizes URL adversarial phishing examples in order to evade sophisticated phishing detection techniques, which rely on semantic relationships between the components of URLs. Vector Machines, Naïve Bayes, and k-Nearest Neighbor.…”
Section: Introductionmentioning
confidence: 99%
“…Adversarial models have been recently used to evade machine learning classifiers. GAN has been used in intrusion detection [12], malware detection [9], and spam detection [31], and phishing [14].…”
Section: Introductionmentioning
confidence: 99%