2022
DOI: 10.1007/s10586-022-03604-4
|View full text |Cite
|
Sign up to set email alerts
|

An intelligent cyber security phishing detection system using deep learning techniques

Abstract: Recently, phishing attacks have become one of the most prominent social engineering attacks faced by public internet users, governments, and businesses. In response to this threat, this paper proposes to give a complete vision to what Machine learning is, what phishers are using to trick gullible users with different types of phishing attacks techniques and based on our survey that phishing emails is the most effective on the targeted sectors and users which we are going to compare as well. Therefore, more eff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 63 publications
(18 citation statements)
references
References 33 publications
0
18
0
Order By: Relevance
“…Multiple decision trees are used in Random Forest (RF), an ensemble learning technique, to increase classification accuracy. Each tree is trained using a separate portion of the training data, and the trees' predictions are combined to get the final prediction [57]. Due to its capacity to manage high-dimensional feature spaces and record complex decision boundaries, RF has been widely used to detect phishing.…”
Section: Theoretical Reviewmentioning
confidence: 99%
“…Multiple decision trees are used in Random Forest (RF), an ensemble learning technique, to increase classification accuracy. Each tree is trained using a separate portion of the training data, and the trees' predictions are combined to get the final prediction [57]. Due to its capacity to manage high-dimensional feature spaces and record complex decision boundaries, RF has been widely used to detect phishing.…”
Section: Theoretical Reviewmentioning
confidence: 99%
“…In their research, Page et al 121 used nine web‐based features and six domain‐based features in their ML method for detecting phishing domains. Last few years, several works have been proposed using ML 122‐129 …”
Section: Ml‐based Solutions For Osn Platformmentioning
confidence: 99%
“…Sustainable solutions have been employed efficiently in many applications including cybersecurity [19,20,21,22], many previous researches have been conducted for protecting users in the Cyber [23,24,25,26].…”
Section: Related Workmentioning
confidence: 99%