Elsevier

Computer Communications

Volume 153, 1 March 2020, Pages 375-381
Computer Communications

A performance analysis of Software Defined Network based prevention on phishing attack in cyberspace using a deep machine learning with CANTINA approach (DMLCA)

https://doi.org/10.1016/j.comcom.2019.11.047Get rights and content

Abstract

This paper discusses a novel frame work approach of Software Defined Network based prevention on phishing attack with the help of the deep machine learning with CANTINA approach (DMLCA) in the cyberspace. Cyber security is a significant concern in the operations of coalition, and is a complex challenge because of some needs in operational effectiveness and also the trust relationship limit which exists over the coalition partners. In networking, new promising paradigms like Software Defined Networks (SDN), offer a method to deal more efficiently with their security constraints. This machine learning approach is to deal with the phishing attack problem based on the SVM (support vector machine) and this machine learning technique with SVM helps to effectively to solve classification problems. The CANTINA approach helps to support the robust hyperlinks with the help of evaluating the term frequency (TF) and inverse document frequency and (IDF). This information retrieval algorithm helps to compare, classify and retrieve various documents. The objective is to improve the detection accuracy with the help of the DMLCA method with the various parameters such as detection accuracy based on the true positive ratio and false positive ratio, precision and recall.

Introduction

Phishing is the social networking attack which often to steal the user information such as login credentials and card details. This attack occurs when the attacker, personate as a trusted entity, deceives suffer into login an email, message or text messages. The phishing attack is the unwanted attempt which is to reach sensitive details such as name, passwords, and card details. This is done when the direct users enter personal details at a duplicate website. This is the example of the social network techniques which are used to receive the deceive users. Implementation of SDN can decrease the overall consumption of power that leads to the cost reduction thereby increases the security of network. The feasibility, programmability, and openness of SDN in turn decrease the difficulty to implement some machine learning strategies for attack prevention. Moreover, SDN is considered to be the most viable solution at which the minimal resources could be employed for performing task without any deviations in overall performance like security. Various types of phishing attacks are presented and explained in this paper.

The phishing attack has three (or 4 or 5) types such as spear phishing, clone phishing, and whaling attacks.

The phishing will be processed with the specific singles or multiple companies which have been denoted as spear phishing. The spear phishing attackers collect the user information and details about their particular target which is to increase the probability of success.

This is one of the types of the phishing attack which is detected with legitimate and previously received electronic mail attachment and to develop an identical or cloned email. This method would be used to pivot from the already infected machine.

The whaling is the coined of the spear phishing which are directed at the senior executives and other high profile estimates. The text will be crafted to the target with an upper manager and the goal in the company. The whaling attack has the content issues of executives like customer complaint. Fig. 1 shows the types of phishing attack.

The machine learning is the most powerful method for determining data and pattern extraction. Following three methods are performed in the detection algorithms such as social graph analysis, user communication profiling, and email structural analysis.

This is the first way to evaluate the machine learning method which would be applied to spear phishing detection which depends on the social community for presenting in the communication patterns. Building the social graph is to be straightforward. When the information is observed by header in the email sent, connections should be observed without reading the contents of the email.

In the user communication profiling, each and everyone has the unique style and the voice which is expressed when the emails are written. This is the most efficient technique present in the combination with the others to improve the probability which detect their receipts.

When the email is got, the email client is to be chosen such as sender, recipient, and time subject, message and attachments. The bulk of information has the most number of emails which it is far from everything in them. In an organization, user specific is built up from the user’s email.

Section snippets

Literature survey

Neda Abdelhamid [1] et al. proposed phishing detection in a recent intelligent machine learning comparison based on models content and features. Machine leaning is the most popular tool for data analysis and used for anti phishing approaches. Describe denote the pros and cons to detect the phishing attacks. There are various types of techniques to reveal the particular options. This is to reveal that there are the various advantages and disadvantages of machine learning predictive models. The

Proposed methodology

We propose a novel frame work approach of SDN based prevention on phishing attack with the help of the deep machine learning with CANTINA approach (DMLCA) in the cyberspace. SDN is a promising networking structure which aims to overwhelm the of legacy networks limitations. The management of centralized SDN guarantees constant functions like holistic visibility, policy enforcement, better scalability, and flex programmable network. The machine learning approach is to deal with the phishing

Simulation and result analysis

We proposed a novel frame work approach of SDN based prevention on phishing attack with the help of the deep machine learning with CANTINA approach (DMLCA) in the cyberspace. The machine learning approach is to deal with the phishing attack problem based on the SVM (support vector machine). This is done to improve the detection accuracy with the help of the DMLCA method with the various parameters such as detection accuracy based on the true positive ratio and false positive ratio, precision

Conclusion

We proposed a novel frame work approach of prevention on SDN based phishing attack with the help of the deep machine learning with CANTINA approach (DMLCA) in the cyberspace. The use of SDN in turn improves the security of network effectively. The machine learning approach deals with the phishing attack problem based on the SVM (support vector machine). The objective is to improve the detection accuracy with the help of the DMLCA method with various parameters such as detection accuracy based

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References (21)

  • AbdelhamidNeda et al.

    Phishing Detection: A Recent Intelligent Machine Learning Comparison based on Models Content and Features

    (2017)
  • BingLi et al.

    Emergent Challenges and IPDS for Anti-Phishing Attack

    (2014)
  • HusakMartin et al.

    PhiGARo: Automatic Phishing Detection and Incident Response Framework

    (2014)
  • FloresWaldo Rocha et al.

    An Empirical Investigation of the Effect of Target Related Information in Phishing Attacks

    (2014)
  • PatilRahul

    A Hybrid Model to Detect Phishing-Sites using Clustering and Bayesian Approach

    (2014)
  • XuZhang et al.

    Gemini: An Emergency Line of Defense Against Phishing Attacks

    (2014)
  • AburaedNour et al.

    Mobile Phishing Attack for Android Platform

    (2014)
  • IbrahimBülbül Halil et al.

    Analysis for Status of the Road Accident Occurrence and Determination of the Risk of Accident by Machine Learning in Istanbul

    (2016)
  • KobashiSyoji et al.

    Prediction of Post-Operative Implanted Knee Function using Machine Learning in Clinical Big Data

    (2016)
  • FanZhun et al.

    Design of a Diamond Adsorption Detection System based on Machine Learning Techniques

    (2016)
There are more references available in the full text version of this article.

Cited by (28)

View all citing articles on Scopus
View full text