Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks
dc.contributor.author | AlEroud, Ahmed | |
dc.contributor.author | Karabatis, George | |
dc.date.accessioned | 2020-04-13T18:45:38Z | |
dc.date.available | 2020-04-13T18:45:38Z | |
dc.date.issued | 2020-03-18 | |
dc.description | IWSPA '20: Proceedings of the Sixth International Workshop on Security and Privacy Analytics IWSPA ’20, March 18, 2020, New Orleans, LA, USA | en_US |
dc.description.abstract | The URL components of web addresses are frequently used in creating phishing detection techniques. Typically, machine learning techniques are widely used to identify anomalous patterns in URLs as signs of possible phishing. However, adversaries may have enough knowledge and motivation to bypass URL classification algorithms by creating examples that evade classification algorithms. This paper proposes an approach that generates URL-based phishing examples using Generative Adversarial Networks. The created examples can fool Blackbox phishing detectors even when those detectors are created using sophisticated approaches such as those relying on intra-URL similarities. These created instances are used to deceive Blackbox machine learning-based phishing detection models. We tested our approach using actual phishing datasets. The results show that GAN networks are very effective in creating adversarial phishing examples that can fool both simple and sophisticated machine learning phishing detection models. | en_US |
dc.description.sponsorship | The authors would like to thank Réseaux IP Européens (RIPE) for supporting this work. We would also like to thank the programmers of MalwareGAN approach for providing their code and experimental results | en_US |
dc.description.uri | https://dl.acm.org/doi/abs/10.1145/3375708.3380315 | en_US |
dc.format.extent | 8 pages | en_US |
dc.genre | conference papers and proceedings postprints | en_US |
dc.identifier | doi:10.13016/m2fswy-xrbm | |
dc.identifier.citation | AlEroud, Ahmed; Karabatis, George; Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks; IWSPA '20: Proceedings of the Sixth International Workshop on Security and Privacy AnalyticsMarch 2020 Pages 53–60; https://dl.acm.org/doi/abs/10.1145/3375708.3380315 | en_US |
dc.identifier.uri | https://doi.org/10.1145/3375708.3380315 | |
dc.identifier.uri | http://hdl.handle.net/11603/18032 | |
dc.language.iso | en_US | en_US |
dc.publisher | Association for Computing Machinery | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Information Systems Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | ||
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.title | Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks | en_US |
dc.type | Text | en_US |