Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks

dc.contributor.authorAlEroud, Ahmed
dc.contributor.authorKarabatis, George
dc.date.accessioned2020-04-13T18:45:38Z
dc.date.available2020-04-13T18:45:38Z
dc.date.issued2020-03-18
dc.descriptionIWSPA '20: Proceedings of the Sixth International Workshop on Security and Privacy Analytics IWSPA ’20, March 18, 2020, New Orleans, LA, USAen
dc.description.abstractThe URL components of web addresses are frequently used in creating phishing detection techniques. Typically, machine learning techniques are widely used to identify anomalous patterns in URLs as signs of possible phishing. However, adversaries may have enough knowledge and motivation to bypass URL classification algorithms by creating examples that evade classification algorithms. This paper proposes an approach that generates URL-based phishing examples using Generative Adversarial Networks. The created examples can fool Blackbox phishing detectors even when those detectors are created using sophisticated approaches such as those relying on intra-URL similarities. These created instances are used to deceive Blackbox machine learning-based phishing detection models. We tested our approach using actual phishing datasets. The results show that GAN networks are very effective in creating adversarial phishing examples that can fool both simple and sophisticated machine learning phishing detection models.en
dc.description.sponsorshipThe authors would like to thank Réseaux IP Européens (RIPE) for supporting this work. We would also like to thank the programmers of MalwareGAN approach for providing their code and experimental resultsen
dc.description.urihttps://dl.acm.org/doi/abs/10.1145/3375708.3380315en
dc.format.extent8 pagesen
dc.genreconference papers and proceedings postprintsen
dc.identifierdoi:10.13016/m2fswy-xrbm
dc.identifier.citationAlEroud, Ahmed; Karabatis, George; Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks; IWSPA '20: Proceedings of the Sixth International Workshop on Security and Privacy AnalyticsMarch 2020 Pages 53–60; https://dl.acm.org/doi/abs/10.1145/3375708.3380315en
dc.identifier.urihttps://doi.org/10.1145/3375708.3380315
dc.identifier.urihttp://hdl.handle.net/11603/18032
dc.language.isoenen
dc.publisherAssociation for Computing Machineryen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.titleBypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networksen
dc.typeTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3375708.3380315 (2).pdf
Size:
1.09 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: