2022
DOI: 10.1007/s10115-022-01672-x
|View full text |Cite
|
Sign up to set email alerts
|

Applications of deep learning for phishing detection: a systematic literature review

Abstract: Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online social networks, and mobile applications. To avoid and mitigate the risks of these attacks, several phishing detection approaches were developed, among which deep learning algorithms provided promising results. However, the results and the corresponding lessons learned are fragmented over many different studies and there is a lack of a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 47 publications
(19 citation statements)
references
References 99 publications
(99 reference statements)
1
18
0
Order By: Relevance
“…Like we can observe in some other domains, like malware detection (Catal et al, 2021) and phishing detection (Catal et al, 2022), CNN, RNN/LSTM/GRU, and MLP are the top three most frequently used DL approaches. The overall reason may be that these algorithms performed well in many tasks, and they are well-known among researchers and practitioners; this fact is indeed mentioned in numerous works covered in this study.…”
Section: Approachessupporting
confidence: 69%
“…Like we can observe in some other domains, like malware detection (Catal et al, 2021) and phishing detection (Catal et al, 2022), CNN, RNN/LSTM/GRU, and MLP are the top three most frequently used DL approaches. The overall reason may be that these algorithms performed well in many tasks, and they are well-known among researchers and practitioners; this fact is indeed mentioned in numerous works covered in this study.…”
Section: Approachessupporting
confidence: 69%
“…Security companies provide solutions for users to manage malicious activities. PhishMe develops software for organization security workers to deal with phishing attacks just by clicking on a button provided in the E-Mail client Add-in [31].…”
Section: Social Network Phishing Attacksmentioning
confidence: 99%
“…The amounts of data and computational power required for learning have increased. Deep learning uses DNNs with hundreds of layers and a large number of parameters related to structure [145][146][147][148][149][150][151][152][153][154][155][156][157][158][159][160][161]. Therefore, it is prone to overfitting, which is a condition where the learning data are overfitted, generalization is not possible, and high accuracy cannot be achieved with unknown data.…”
Section: Amounts Of Data and Computational Powermentioning
confidence: 99%