Detecting Turkish phishing attacks with machine learning classifiers

Download
2019
Turhanlar, Melih
Phishing Attacks are social engineering attacks that aim at stealing victim’s credit card numbers, credentials, and personal information by exploiting victim’s emotions, such as curiosity and fear. The attacker usually sends a webpage link in embodied in textual content. If the victim clicks the link, they usually connect to a mock webpage that imitates a real, institutional webpage. Filling the HTML forms in the mock webpage, the victim sends their credentials unwittingly to the attacker. In our day, phishing is a global issue. This study presents a framework for detecting phishing text in Turkish by running machine learning classifiers on an imbalanced phishing data set. The training dataset covers e-mails, SMS text and tweets. The results show that Logistic Regression Synthetic Minority Over-Sampling Technique achieves high performance, as indicated by Fmeasures, compared to a set of 32 machine learning models in our study.

Suggestions

DETECTING MALICIOUS API CALL SEQUENCES IN BINARY PROGRAMS USING DYNAMIC SYMBOLIC EXECUTION
Tatar, Fatih Tamer; Betin Can, Aysu (2022-10-01)
As malicious software gets more stealthy and smarter, software analysis has become an essential part of malware detection. Modern malware does not immediately display its malicious behavior, especially if they are aware that it is being analyzed. For instance, malware can detect the runtime environment and use certain triggers, such as time, to avoid detection. Static analysis fails on obfuscated code whereas dynamic analysis struggles to find the right actions and conditions to trigger malicious act...
Automatic detection of cyber security events from Turkish twitter stream and Turkish newspaper data
Ural, Özgür; Acartürk, Cengiz; Department of Cyber Security (2019)
Cybersecurity experts scan the internet and face security events that influence users, institutions, and governments. An information security analyst regularly examines sources to stay up to date on security events in her/his domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) atta...
Undermining User Privacy on Mobile Devices Using AI
Gulmezoglu, Berk; Zankl, Andreas; Tol, M. Caner; Islam, Saad; Eisenbarth, Thomas; Sunar, Berk (2019-01-01)
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern processors pose a serious threat to user privacy. This is because applications leave distinct footprints in the processor, which malware can use to infer user activities. In this work, we show that these inference attacks can greatly be enhanced with advanced AI techniques. In particular, we focus on profiling the activity in the last-level cache (LLC) of ARM processors. We employ a simple Prime+Probe based mon...
Detecting malicious behavior in binary programs using dynamic symbolic execution and API call sequences
Tatar, Fatih Tamer; Betin Can, Aysu; Department of Bioinformatics (2021-6)
Program analysis becomes an important part of malware detection as malware become stealthier and more complex. For example, modern malware may detect whether they are under analysis and they may use certain triggers such as time to avoid detection. However, current detection techniques turn out to be insufficient as they have limitations to detect new, obfuscated, and intelligent malware. In this thesis, we propose a behavior based malware detection methodology using API call sequence analysis. In our metho...
Detection of malicious web pages
Süren, Emre; Özkan Yıldırım, Sevgi; Department of Information Systems (2014)
Cyber-attacks have been shaking the virtual world and malicious web pages have become a major weapon for Internet crimes. They host a number of malicious contents; such as spam, phishing, and drive-by download. Drive-by download technique exploits the victim’s machine and downloads a malware without any notice or consent. After infection, victim’s private data is stolen or encrypted and even worse the compromised machine is instrumented to mount further attacks. To this end, researchers have focused on prot...
Citation Formats
M. Turhanlar, “Detecting Turkish phishing attacks with machine learning classifiers,” Thesis (M.S.) -- Graduate School of Informatics. Cyber Security., Middle East Technical University, 2019.