Yayın:
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)

dc.contributor.authorElberri, Mustafa Ahmed
dc.contributor.authorTokeşer, Ümit
dc.contributor.authorRahebi, Javad
dc.contributor.authorLopez-Guede, Jose Manuel
dc.date.accessioned2026-01-04T20:23:45Z
dc.date.issued2024-05-05
dc.description.abstractAbstractPhishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting phishing attacks. However, traditional CNN-based image classification methods face limitations in effectively identifying fake pages. To address this challenge, we propose an image-based coding approach for detecting phishing attacks using a CNN-LSTM hybrid model. This approach combines SMOTE, an enhanced GAN based on the Autoencoder network, and swarm intelligence algorithms to balance the dataset, select informative features, and generate grayscale images. Experiments on three benchmark datasets demonstrate that the proposed method achieves superior accuracy, precision, and sensitivity compared to other techniques, effectively identifying phishing attacks and enhancing online security.
dc.description.urihttps://doi.org/10.1007/s10207-024-00851-x
dc.identifier.doi10.1007/s10207-024-00851-x
dc.identifier.eissn1615-5270
dc.identifier.endpage2606
dc.identifier.issn1615-5262
dc.identifier.openairedoi_________::f62b81e7812174b68eed752543ab407b
dc.identifier.scopus2-s2.0-85192056954
dc.identifier.startpage2583
dc.identifier.urihttps://hdl.handle.net/20.500.12597/41774
dc.identifier.volume23
dc.identifier.wos001218782700002
dc.language.isoeng
dc.publisherSpringer Science and Business Media LLC
dc.relation.ispartofInternational Journal of Information Security
dc.rightsOPEN
dc.titleA cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)
dc.typeArticle
dspace.entity.typePublication
local.api.response{"authors":[{"fullName":"Mustafa Ahmed Elberri","name":"Mustafa Ahmed","surname":"Elberri","rank":1,"pid":null},{"fullName":"Ümit Tokeşer","name":"Ümit","surname":"Tokeşer","rank":2,"pid":null},{"fullName":"Javad Rahebi","name":"Javad","surname":"Rahebi","rank":3,"pid":null},{"fullName":"Jose Manuel Lopez-Guede","name":"Jose Manuel","surname":"Lopez-Guede","rank":4,"pid":null}],"openAccessColor":"hybrid","publiclyFunded":false,"type":"publication","language":{"code":"eng","label":"English"},"countries":null,"subjects":[{"subject":{"scheme":"FOS","value":"0202 electrical engineering, electronic engineering, information engineering"},"provenance":null},{"subject":{"scheme":"FOS","value":"02 engineering and technology"},"provenance":null}],"mainTitle":"A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)","subTitle":null,"descriptions":["<jats:title>Abstract</jats:title><jats:p>Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting phishing attacks. However, traditional CNN-based image classification methods face limitations in effectively identifying fake pages. To address this challenge, we propose an image-based coding approach for detecting phishing attacks using a CNN-LSTM hybrid model. This approach combines SMOTE, an enhanced GAN based on the Autoencoder network, and swarm intelligence algorithms to balance the dataset, select informative features, and generate grayscale images. Experiments on three benchmark datasets demonstrate that the proposed method achieves superior accuracy, precision, and sensitivity compared to other techniques, effectively identifying phishing attacks and enhancing online security.</jats:p>"],"publicationDate":"2024-05-05","publisher":"Springer Science and Business Media LLC","embargoEndDate":null,"sources":["Crossref"],"formats":null,"contributors":null,"coverages":null,"bestAccessRight":{"code":"c_abf2","label":"OPEN","scheme":"http://vocabularies.coar-repositories.org/documentation/access_rights/"},"container":{"name":"International Journal of Information Security","issnPrinted":"1615-5262","issnOnline":"1615-5270","issnLinking":null,"ep":"2606","iss":null,"sp":"2583","vol":"23","edition":null,"conferencePlace":null,"conferenceDate":null},"documentationUrls":null,"codeRepositoryUrl":null,"programmingLanguage":null,"contactPeople":null,"contactGroups":null,"tools":null,"size":null,"version":null,"geoLocations":null,"id":"doi_________::f62b81e7812174b68eed752543ab407b","originalIds":["851","10.1007/s10207-024-00851-x","50|doiboost____|f62b81e7812174b68eed752543ab407b"],"pids":[{"scheme":"doi","value":"10.1007/s10207-024-00851-x"}],"dateOfCollection":null,"lastUpdateTimeStamp":null,"indicators":{"citationImpact":{"citationCount":10,"influence":3.396283e-9,"popularity":1.0420162e-8,"impulse":10,"citationClass":"C5","influenceClass":"C4","impulseClass":"C4","popularityClass":"C4"}},"instances":[{"pids":[{"scheme":"doi","value":"10.1007/s10207-024-00851-x"}],"license":"CC BY","type":"Article","urls":["https://doi.org/10.1007/s10207-024-00851-x"],"publicationDate":"2024-05-05","refereed":"peerReviewed"}],"isGreen":false,"isInDiamondJournal":false}
local.import.sourceOpenAire
local.indexed.atWOS
local.indexed.atScopus

Dosyalar

Koleksiyonlar