Cargando…
Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis
In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies and use URLs to exploit vulnerabilities for illicit benefits s...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098541/ https://www.ncbi.nlm.nih.gov/pubmed/37050527 http://dx.doi.org/10.3390/s23073467 |
_version_ | 1785024834658369536 |
---|---|
author | Nagy, Naya Aljabri, Malak Shaahid, Afrah Ahmed, Amnah Albin Alnasser, Fatima Almakramy, Linda Alhadab, Manar Alfaddagh, Shahad |
author_facet | Nagy, Naya Aljabri, Malak Shaahid, Afrah Ahmed, Amnah Albin Alnasser, Fatima Almakramy, Linda Alhadab, Manar Alfaddagh, Shahad |
author_sort | Nagy, Naya |
collection | PubMed |
description | In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies and use URLs to exploit vulnerabilities for illicit benefits such as stealing users’ personal and sensitive data, which can lead to financial loss, discredit, ransomware, or the spread of malicious infections and catastrophic cyber-attacks such as phishing attacks. Phishing attacks are being recognized as the leading source of data breaches and the most prevalent deceitful scam of cyber-attacks. Artificial intelligence (AI)-based techniques such as machine learning (ML) and deep learning (DL) have proven to be infallible in detecting phishing attacks. Nevertheless, sequential ML can be time intensive and not highly efficient in real-time detection. It can also be incapable of handling vast amounts of data. However, utilizing parallel computing techniques in ML can help build precise, robust, and effective models for detecting phishing attacks with less computation time. Therefore, in this proposed study, we utilized various multiprocessing and multithreading techniques in Python to train ML and DL models. The dataset used comprised 54 K records for training and 12 K for testing. Five experiments were carried out, the first one based on sequential execution followed by the next four based on parallel execution techniques (threading using Python parallel backend, threading using Python parallel backend and number of jobs, threading manually, and multiprocessing using Python parallel backend). Four models, namely, random forest (RF), naïve bayes (NB), convolutional neural network (CNN), and long short-term memory (LSTM) were deployed to carry out the experiments. Overall, the experiments yielded excellent results and speedup. Lastly, to consolidate, a comprehensive comparative analysis was performed. |
format | Online Article Text |
id | pubmed-10098541 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100985412023-04-14 Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis Nagy, Naya Aljabri, Malak Shaahid, Afrah Ahmed, Amnah Albin Alnasser, Fatima Almakramy, Linda Alhadab, Manar Alfaddagh, Shahad Sensors (Basel) Article In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies and use URLs to exploit vulnerabilities for illicit benefits such as stealing users’ personal and sensitive data, which can lead to financial loss, discredit, ransomware, or the spread of malicious infections and catastrophic cyber-attacks such as phishing attacks. Phishing attacks are being recognized as the leading source of data breaches and the most prevalent deceitful scam of cyber-attacks. Artificial intelligence (AI)-based techniques such as machine learning (ML) and deep learning (DL) have proven to be infallible in detecting phishing attacks. Nevertheless, sequential ML can be time intensive and not highly efficient in real-time detection. It can also be incapable of handling vast amounts of data. However, utilizing parallel computing techniques in ML can help build precise, robust, and effective models for detecting phishing attacks with less computation time. Therefore, in this proposed study, we utilized various multiprocessing and multithreading techniques in Python to train ML and DL models. The dataset used comprised 54 K records for training and 12 K for testing. Five experiments were carried out, the first one based on sequential execution followed by the next four based on parallel execution techniques (threading using Python parallel backend, threading using Python parallel backend and number of jobs, threading manually, and multiprocessing using Python parallel backend). Four models, namely, random forest (RF), naïve bayes (NB), convolutional neural network (CNN), and long short-term memory (LSTM) were deployed to carry out the experiments. Overall, the experiments yielded excellent results and speedup. Lastly, to consolidate, a comprehensive comparative analysis was performed. MDPI 2023-03-26 /pmc/articles/PMC10098541/ /pubmed/37050527 http://dx.doi.org/10.3390/s23073467 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Nagy, Naya Aljabri, Malak Shaahid, Afrah Ahmed, Amnah Albin Alnasser, Fatima Almakramy, Linda Alhadab, Manar Alfaddagh, Shahad Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis |
title | Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis |
title_full | Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis |
title_fullStr | Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis |
title_full_unstemmed | Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis |
title_short | Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis |
title_sort | phishing urls detection using sequential and parallel ml techniques: comparative analysis |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098541/ https://www.ncbi.nlm.nih.gov/pubmed/37050527 http://dx.doi.org/10.3390/s23073467 |
work_keys_str_mv | AT nagynaya phishingurlsdetectionusingsequentialandparallelmltechniquescomparativeanalysis AT aljabrimalak phishingurlsdetectionusingsequentialandparallelmltechniquescomparativeanalysis AT shaahidafrah phishingurlsdetectionusingsequentialandparallelmltechniquescomparativeanalysis AT ahmedamnahalbin phishingurlsdetectionusingsequentialandparallelmltechniquescomparativeanalysis AT alnasserfatima phishingurlsdetectionusingsequentialandparallelmltechniquescomparativeanalysis AT almakramylinda phishingurlsdetectionusingsequentialandparallelmltechniquescomparativeanalysis AT alhadabmanar phishingurlsdetectionusingsequentialandparallelmltechniquescomparativeanalysis AT alfaddaghshahad phishingurlsdetectionusingsequentialandparallelmltechniquescomparativeanalysis |