2023
DOI: 10.3390/computers12060118
|View full text |Cite
|
Sign up to set email alerts
|

Unbalanced Web Phishing Classification through Deep Reinforcement Learning

Antonio Maci,
Alessandro Santorsola,
Antonio Coscia
et al.

Abstract: Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramount. Furthermore, web phishing detection is an unbalanced classification task, as legitimate URLs outnumber malicious ones in real-life cases. Deep learning (DL) has emerged as a promising technique to minimize concept drift to enhance web phishing detection. De… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 64 publications
0
2
0
Order By: Relevance
“…Deep reinforcement learning (DRL) emerges as a viable solution by tackling these issues through a reward-based mechanism. Unlike conventional deep learning techniques that learn passively from a static dataset, DRL agents actively engage with their environment (Maci et al 2023). They make decisions that lead to feedback through rewards or penalties, facilitating a learning process that prioritizes long-term benefits and strategic adjustments.…”
Section: Introductionmentioning
confidence: 99%
“…Deep reinforcement learning (DRL) emerges as a viable solution by tackling these issues through a reward-based mechanism. Unlike conventional deep learning techniques that learn passively from a static dataset, DRL agents actively engage with their environment (Maci et al 2023). They make decisions that lead to feedback through rewards or penalties, facilitating a learning process that prioritizes long-term benefits and strategic adjustments.…”
Section: Introductionmentioning
confidence: 99%
“…As a subfield of AI, machine learning (ML) involves data-driven algorithms that support the decision-making process of SOC analysts in detecting network intrusions (Anumol, 2015 ). In the current literature, several research works propose innovative AI-based intrusion detection methodologies (Das et al, 2019 ; Singh A. et al, 2022 ; Alkhudaydi et al, 2023 ; Maci et al, 2023 , 2024 ; Park et al, 2023 ; Coscia et al, 2024 ). A SIEM can integrate these techniques to enhance real-time analysis capabilities (Muhammad et al, 2023 ).…”
Section: Introductionmentioning
confidence: 99%