Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Detecting Turkish phishing attacks with machine learning classifiers
Download
index.pdf
Date
2019
Author
Turhanlar, Melih
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
207
views
86
downloads
Cite This
Phishing Attacks are social engineering attacks that aim at stealing victim’s credit card numbers, credentials, and personal information by exploiting victim’s emotions, such as curiosity and fear. The attacker usually sends a webpage link in embodied in textual content. If the victim clicks the link, they usually connect to a mock webpage that imitates a real, institutional webpage. Filling the HTML forms in the mock webpage, the victim sends their credentials unwittingly to the attacker. In our day, phishing is a global issue. This study presents a framework for detecting phishing text in Turkish by running machine learning classifiers on an imbalanced phishing data set. The training dataset covers e-mails, SMS text and tweets. The results show that Logistic Regression Synthetic Minority Over-Sampling Technique achieves high performance, as indicated by Fmeasures, compared to a set of 32 machine learning models in our study.
Subject Keywords
Phishing.
,
Turkish Phishing Attacks
,
Machine Learning
,
Imbalanced Dataset.
URI
http://etd.lib.metu.edu.tr/upload/12624689/index.pdf
https://hdl.handle.net/11511/45253
Collections
Graduate School of Informatics, Thesis
Suggestions
OpenMETU
Core
DETECTING MALICIOUS API CALL SEQUENCES IN BINARY PROGRAMS USING DYNAMIC SYMBOLIC EXECUTION
Tatar, Fatih Tamer; Betin Can, Aysu (2022-10-01)
As malicious software gets more stealthy and smarter, software analysis has become an essential part of malware detection. Modern malware does not immediately display its malicious behavior, especially if they are aware that it is being analyzed. For instance, malware can detect the runtime environment and use certain triggers, such as time, to avoid detection. Static analysis fails on obfuscated code whereas dynamic analysis struggles to find the right actions and conditions to trigger malicious act...
Automatic detection of cyber security events from Turkish twitter stream and Turkish newspaper data
Ural, Özgür; Acartürk, Cengiz; Department of Cyber Security (2019)
Cybersecurity experts scan the internet and face security events that influence users, institutions, and governments. An information security analyst regularly examines sources to stay up to date on security events in her/his domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) atta...
Undermining User Privacy on Mobile Devices Using AI
Gulmezoglu, Berk; Zankl, Andreas; Tol, M. Caner; Islam, Saad; Eisenbarth, Thomas; Sunar, Berk (2019-01-01)
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern processors pose a serious threat to user privacy. This is because applications leave distinct footprints in the processor, which malware can use to infer user activities. In this work, we show that these inference attacks can greatly be enhanced with advanced AI techniques. In particular, we focus on profiling the activity in the last-level cache (LLC) of ARM processors. We employ a simple Prime+Probe based mon...
Detecting malicious behavior in binary programs using dynamic symbolic execution and API call sequences
Tatar, Fatih Tamer; Betin Can, Aysu; Department of Bioinformatics (2021-6)
Program analysis becomes an important part of malware detection as malware become stealthier and more complex. For example, modern malware may detect whether they are under analysis and they may use certain triggers such as time to avoid detection. However, current detection techniques turn out to be insufficient as they have limitations to detect new, obfuscated, and intelligent malware. In this thesis, we propose a behavior based malware detection methodology using API call sequence analysis. In our metho...
Detection of malicious web pages
Süren, Emre; Özkan Yıldırım, Sevgi; Department of Information Systems (2014)
Cyber-attacks have been shaking the virtual world and malicious web pages have become a major weapon for Internet crimes. They host a number of malicious contents; such as spam, phishing, and drive-by download. Drive-by download technique exploits the victim’s machine and downloads a malware without any notice or consent. After infection, victim’s private data is stolen or encrypted and even worse the compromised machine is instrumented to mount further attacks. To this end, researchers have focused on prot...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
M. Turhanlar, “Detecting Turkish phishing attacks with machine learning classifiers,” Thesis (M.S.) -- Graduate School of Informatics. Cyber Security., Middle East Technical University, 2019.