A Proposal Phishing Attack Detection System on Twitter

A Proposal Phishing Attack Detection System on Twitter

kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, Yassine Ramdane
Copyright: © 2022 |Pages: 27
DOI: 10.4018/IJISP.309131
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The security of personal data is crucial for a company or any individual. Phishing is one of the most common and dangerous cybercrime attacks. These attacks aim to steal information used by individuals and organizations using social engineering, which is a key point for the success of the phishing attack. Even though there are several systems and solutions, the amount of personal information stolen continues to increase as cyberattacks become more difficult to detect. This paper consists of a broad review to study the work carried out in the fight against phishing and the identification of vulnerabilities in existing systems to achieve better efficiency. The authors focused on the social medium Twitter to study the phishing attacks passing through this medium, and they present their new design, which is based on new features. The classification of the approach includes 23 features and uses the MLP artificial neural network (ANN MLP) algorithm. Experiments show that the system is effective at detecting phishing sites, with a 96% success rate using recent data.
Article Preview
Top

Introduction

Phishing is an online scam in which cybercriminals pose as trusted actors to trick their victims into sharing sensitive data or installing malware. This can potentially include personal information. Phishing is considered a “social engineering” attack because its success relies on human error rather than the victims' hardware or software (Gabrailova, 2021). According to the latest reports from the anti-phishing working group [APWG] (2021), phishing has evolved significantly today, causing severe economic losses worldwide. Phishing sites are also proliferating in quantity and complexity. Figure 1 represents the number of phishing sites and the number of emails from august 2019 to March 2021. This number represents only phishing sites and emails detected by APWG (2021) and its partners.

Figure 1.

Phishing activity from 3rd quarter of 2019 to 2nd quarter of 2021 by APWG (2021)

IJISP.309131.f01

Cybercriminals use various techniques that sometimes cannot be detected by existing anti-phishing mechanisms. This includes URL shortening, use of subdomains, link manipulation techniques, and use of URL redirects (Communications Security Establishment, 2020), all based on social engineering to deceive users. According to Liu et al., (2021), an increasing number of features are extracted by anti-phishing methods, but the reason for extracting these features is not clear. The existing features do not sufficiently reflect the nature of phishing, which steals sensitive information through spoofing. This leads to a result in which the features are only valid in a few limited and specific scenarios, such as for specified datasets or a browser plug-in. Besides, researchers prefer to use a reduced combination of approaches to increase the processing time of their system (Lee et al., (2015), Jain and Gupta., (2016), Choon et al., (2017), Dalgic et al., (2018), Shirazi et al., (2018), Orunsolu et al., (2019), Halgaš et al., (2020), Azeez et al., (2020), and Opara et al., (2020).

In the present work, we propose a new design and implementation that include new features for detecting and analyzing phishing on social media, especially on Twitter. The following points distinguish our contribution:

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing