Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks

dc.contributor.authorAlEroud, Ahmed
dc.contributor.authorKarabatis, George
dc.date.accessioned2020-04-13T18:45:38Z
dc.date.available2020-04-13T18:45:38Z
dc.date.issued2020-03-18
dc.descriptionIWSPA '20: Proceedings of the Sixth International Workshop on Security and Privacy Analytics IWSPA ’20, March 18, 2020, New Orleans, LA, USAen_US
dc.description.abstractThe URL components of web addresses are frequently used in creating phishing detection techniques. Typically, machine learning techniques are widely used to identify anomalous patterns in URLs as signs of possible phishing. However, adversaries may have enough knowledge and motivation to bypass URL classification algorithms by creating examples that evade classification algorithms. This paper proposes an approach that generates URL-based phishing examples using Generative Adversarial Networks. The created examples can fool Blackbox phishing detectors even when those detectors are created using sophisticated approaches such as those relying on intra-URL similarities. These created instances are used to deceive Blackbox machine learning-based phishing detection models. We tested our approach using actual phishing datasets. The results show that GAN networks are very effective in creating adversarial phishing examples that can fool both simple and sophisticated machine learning phishing detection models.en_US
dc.description.sponsorshipThe authors would like to thank Réseaux IP Européens (RIPE) for supporting this work. We would also like to thank the programmers of MalwareGAN approach for providing their code and experimental resultsen_US
dc.description.urihttps://dl.acm.org/doi/abs/10.1145/3375708.3380315en_US
dc.format.extent8 pagesen_US
dc.genreconference papers and proceedings postprintsen_US
dc.identifierdoi:10.13016/m2fswy-xrbm
dc.identifier.citationAlEroud, Ahmed; Karabatis, George; Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks; IWSPA '20: Proceedings of the Sixth International Workshop on Security and Privacy AnalyticsMarch 2020 Pages 53–60; https://dl.acm.org/doi/abs/10.1145/3375708.3380315en_US
dc.identifier.urihttps://doi.org/10.1145/3375708.3380315
dc.identifier.urihttp://hdl.handle.net/11603/18032
dc.language.isoen_USen_US
dc.publisherAssociation for Computing Machineryen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartof
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.titleBypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networksen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3375708.3380315 (2).pdf
Size:
1.09 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: