Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks
Loading...
Links to Files
Author/Creator
Author/Creator ORCID
Date
2020-03-18
Type of Work
Department
Program
Citation of Original Publication
AlEroud, Ahmed; Karabatis, George; Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks; IWSPA '20: Proceedings of the Sixth International Workshop on Security and Privacy AnalyticsMarch 2020 Pages 53–60; https://dl.acm.org/doi/abs/10.1145/3375708.3380315
Rights
This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
Subjects
Abstract
The URL components of web addresses are frequently used in creating phishing detection techniques. Typically, machine learning techniques are widely used to identify anomalous patterns in URLs as signs of possible phishing. However, adversaries may have enough knowledge and motivation to bypass URL classification algorithms by creating examples that evade classification algorithms. This paper proposes an approach that generates URL-based phishing examples using Generative
Adversarial Networks. The created examples can fool Blackbox phishing detectors even when those detectors are created using
sophisticated approaches such as those relying on intra-URL similarities. These created instances are used to deceive Blackbox
machine learning-based phishing detection models. We tested our approach using actual phishing datasets. The results show that
GAN networks are very effective in creating adversarial phishing examples that can fool both simple and sophisticated machine
learning phishing detection models.