Whale Optimization and AutoML for Precise Phishing Detection
DOI:
https://doi.org/10.13052/jmm1550-4646.2153Keywords:
Phishing Attack, Optimization Algorithm, Whale Optimization Algorithm, AutoML Framework, AutoML H2O, Regression Analysis, Random Forest AlgorithmAbstract
Online fraud and social engineering tactics frequently use phishing websites as platforms. Phishers often modify the source code of the web pages they exploit in their attacks to create the illusion that alterations were made to authentic websites. A solitary response is insufficient to mitigate phishing due to the many methods employed in its execution. This study examines machine learning algorithms and evaluates their efficacy when trained on datasets including attributes that differentiate secure websites from phishing sites. Automated algorithms facilitate real-time fraud protection by swiftly detecting suspicious URLs, domain names, and website content. This study aims to identify the optimal method for detecting a prevalent category of cyberattacks. This would enhance the security and privacy of all internet users by facilitating the identification and blocking of malicious websites. Nonetheless, there is an urgent desire for automated models that provide rapid and precise detection. This research introduces a regression-based assessment method for phishing detection to address this demand. Our approach employs a whale optimization algorithm for feature selection. An AutoML framework subsequently utilizes the selected feature subsets as input. The model showed good accuracy in its predictions with very small errors on the test data, shown by an RMSE of 0.1079, an MSE of 0.0116, and an R2 value of 0.9534. These results demonstrate the reliability of our feature selection and modeling methods.
Downloads
References
M. Nanda, M. Saraswat, and P. K. Sharma, “Enhancing cybersecurity: A review and comparative analysis of convolutional neural network approaches for detecting URL-based phishing attacks,” e-Prime – Adv. Electr. Eng. Electron. Energy, vol. 8, no. March, p. 100533, 2024, doi: 10.1016/j.prime.2024.100533.
E. S. Shombot, G. Dusserre, R. Bestak, and N. B. Ahmed, “An application for predicting phishing attacks: A case of implementing a support vector machine learning model,” Cyber Secur. Appl., vol. 2, no. January, 2024, doi: 10.1016/j.csa.2024.100036.
V. Dixit and D. Kaur, “Development of Two-Factor Authentication to Mitigate Phishing Attack,” no. July 2019, pp. 787–802, 2024, doi: 10.4236/jsea.2024.1711043.
R. Basnet and A. H. Sung, “Rule-Based Phishing Attack Detection Rule-Based Phishing Attack Detection,” no. October, 2016.
S. Hossain, D. Sarma, and R. J. Chakma, “Machine learning-based phishing attack detection,” Int. J. Adv. Comput. Sci. Appl., vol. 11, no. 9, pp. 378–388, 2020, doi: 10.14569/IJACSA.2020.0110945.
P. E. Reports, P. S. Trends, B. P. Measurement, E. P. Attacks, M. Targeted, and I. Sectors, “Peter Cassidy, PHISHING ACTIVITY TRENDS REPOR, 2024,” no. March, pp. 1–11, 2024.
P. Kalaharsha and B. M. Mehtre, “Detecting Phishing Sites – An Overview,” pp. 1–13, 2021, [Online]. Available: http://arxiv.org/abs/2103.12739.
M. Dadkhah, M. D. Jazi, M. S. Mobarakeh, S. Shamshirband, X. Wang, and S. Raste, “An overview of phishing attacks and their detection techniques,” Int. J. Internet Protoc. Technol., vol. 9, no. 4, 2016, doi: 10.1504/IJIPT.2016.081319.
S. Hawa Apandi, J. Sallim, and R. Mohd Sidek, “Types of anti-phishing solutions for phishing attack,” in IOP Conference Series: Materials Science and Engineering, 2020. doi: 10.1088/1757-899X/769/1/012072.
G. J. W. Kathrine, P. M. Praise, A. A. Rose, and E. C. Kalaivani, “Variants of phishing attacks and their detection techniques,” in Proceedings of the International Conference on Trends in Electronics and Informatics, ICOEI 2019, 2019. doi: 10.1109/ICOEI.2019.8862697.
Z. Salah, H. Abu Owida, E. Abu Elsoud, E. Alhenawi, S. Abuowaida, and N. Alshdaifat, “An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form,” Futur. Internet, vol. 16, no. 11, pp. 1–24, 2024, doi: 10.3390/fi16110414.
K. H. Chy, “Securing the web: Machine learning’s role in predicting and preventing phishing attacks Securing the web: Machine learning’s role in predicting and preventing phishing attacks,” no. September, 2024, doi: 10.30574/ijsra.2024.13.1.1770.
Jain, A. K., and Gupta, B. B. (2021). A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Information Systems, 16(4), 527–565. https://doi.org/10.1080/17517575.2021.1896786.
M. Baykara and Z. Z. Gürel, “Detection of phishing attacks,” 6th Int. Symp. Digit. Forensic Secur. ISDFS 2018 – Proceeding, vol. 2018-January, pp. 1–5, May 2018, doi: 10.1109/ISDFS.2018.8355389.
“Web Phishing Detection Using Web Crawling, Cloud Infrastructure and Deep Learning Framework”, JASTT, vol. 4, no. 01, pp. 54–71, Mar. 2023, doi: 10.38094/jastt401144.
T. Peng, I. Harris, and Y. Sawa, “Detecting Phishing Attacks Using Natural Language Processing and Machine Learning,” in Proceedings – 12th IEEE International Conference on Semantic Computing, ICSC 2018, 2018. doi: 10.1109/ICSC.2018.00056.
A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil, and K. Kifayat, “A comprehensive survey of AI-enabled phishing attacks detection techniques,” Telecommun. Syst., vol. 76, no. 1, pp. 139–154, Jan. 2021, doi: 10.1007/S11235-020-00733-2/TABLES/5.
R. O. Akinyede and J. A. Adelakun, “Detection and Prevention of Phishing Attack Using Linkguard Algorithm,” J. Inf., vol. 4, no. 1, 2018, doi: 10.18488/journal.104.2018.41.10.23.
N. Q. Do, A. Selamat, O. Krejcar, E. Herrera-Viedma and H. Fujita, “Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions,” in IEEE Access, vol. 10, pp. 36429–36463, 2022, doi: 10.1109/ACCESS.2022.3151903.
Aljofey, A., Jiang, Q., Rasool, A. et al. An effective detection approach for phishing websites using URL and HTML features. Sci Rep 12, 8842 (2022). https://doi.org/10.1038/s41598-022-10841-5.
B. Espinoza, J. Simba, W. Fuertes, E. Benavides, R. Andrade, and T. Toulkeridis, “Phishing attack detection: A solution based on the typical machine learning modeling cycle,” in Proceedings – 6th Annual Conference on Computational Science and Computational Intelligence, CSCI 2019, 2019. doi: 10.1109/CSCI49370.2019.00041.
L. M. Abdulrahman, S. H. Ahmed, Z. N. Rashid, Y. S. Jghef, T. M. Ghazi, and U. H. Jader, “Web Phishing Detection Using Web Crawling, Cloud Infrastructure and Deep Learning Framework,” J. Appl. Sci. Technol. Trends, vol. 4, no. 01, 2023, doi: 10.38094/jastt401144.
Tan, Choon Lin (2018), “Phishing Dataset for Machine Learning: Feature Evaluation”, Mendeley Data, V1, doi: 10.17632/h3cgnj8hft.1.
H2O.ai, “H2O AutoML: Automatic Machine Learning,” H2O.ai, 2024, [Online]. Available: https://docs.h2o.ai/h2o/latest-stable/h2o-docs/automl.html.
R. O. Akinyede and J. A. Adelakun, “Detection and Prevention of Phishing Attack Using Linkguard Algorithm,” J. Inf., vol. 4, no. 1, pp. 10–23, 2018, doi: 10.18488/journal.104.2018.41.10.23.
K. L. Chiew, C. L. Tan, K. S. Wong, K. S. C. Yong, and W. K. Tiong, “A new hybrid ensemble feature selection framework for machine learning-based phishing detection system,” Inf. Sci. (Ny)., vol. 484, pp. 153–166, 2019, doi: 10.1016/j.ins.2019.01.064.



