2023
DOI: 10.3390/s23073467
|View full text |Cite
|
Sign up to set email alerts
|

Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis

Abstract: In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies and use URLs to exploit vulnerabilities for illicit benefits such as stealing users’ personal and sensitive data, which can lead to financial loss, discredit, ransomware, or the spread of malicious infections and catastrophic cyber-attacks such as phishing attacks. Phishing at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…Turning to deep learning-based models, the Phish-Net model, as proposed in recent literature, employs a blend of sequential and parallel machine learning techniques for phishing URL detection. This model has demonstrated notable efficacy, with Random Forest algorithm showing the highest accuracy in identifying phishing URLs [28]. DeepPhish is another exemplary model that uses a deep neural network architecture for phishing attack detection, achieving high accuracy in its domain [29].…”
Section: Related Workmentioning
confidence: 99%
“…Turning to deep learning-based models, the Phish-Net model, as proposed in recent literature, employs a blend of sequential and parallel machine learning techniques for phishing URL detection. This model has demonstrated notable efficacy, with Random Forest algorithm showing the highest accuracy in identifying phishing URLs [28]. DeepPhish is another exemplary model that uses a deep neural network architecture for phishing attack detection, achieving high accuracy in its domain [29].…”
Section: Related Workmentioning
confidence: 99%
“…The use of joblib is to include training iterations in parallel. A Parallel class in joblib is used to perform parallel operations [40] [41]. The Parallel object takes the argument n jobs, which specifies the number of processes or threads used in parallel.…”
Section: ) Training Data Using Joblibmentioning
confidence: 99%
“…Then, speedup measures how fast a program runs on p systems (for example, p processors) compared to running on just one system. The speedup formula is shown in equation ( 3) [41]. The main goal of parallel processing is to achieve significant speedup, enabling the completion of more complex and large tasks in less time.…”
Section: Accuracy = T P + T N T P + T N + Fn + Fpmentioning
confidence: 99%
“…Since the preceding decade, substantial use of AI techniques, namely ML and DL, has been made in the cybersecurity discipline [ 11 , 12 , 13 , 14 , 15 , 16 ]. The potential of these techniques is to learn from the data that are provided and, as a result, extract valuable insights and correctly predict cases in the future.…”
Section: Introductionmentioning
confidence: 99%