Edited Phishing Domains Detection Using Deep Learning
Edited Phishing Domains Detection Using Deep Learning
Techniques
T J Ayo O D Alowolodu
The Federal University of Technology, The Federal University of Technology,
Nigeria. Nigeria.
[email protected] [email protected]
where T is the training set, pi represents the B. Gated Recurrent Unit (GRU)
probability that a sample in T belong to a distinct
class c i, E ( T ) represents the entropy of T , and m The Gated Recurrent Unit (GRU) is a type of
represents the total number of distinct classes in T . recurrent neural network (RNN) architecture
designed to model sequential data, much like the
In this study dropouts were used inside the deep
Long Short-Term Memory (LSTM) network.
learning models to reduce the overfitting by
However, GRU offers a simpler and more
removing certain features randomly by making
computationally efficient architecture. While
them zero.
LSTM maintains a separate memory cell state that
The reduced data feature set will be passed into the is updated through three gates (input, output, and
three (3) Deep Learning model concurrently for forget gates), GRU streamlines this process by
training and Testing. using only two gates: the reset gate and the update
gate. The reset gate controls the amount of the
previous hidden state to forget, and the update gate
determines how much of the new information
should be incorporated into the hidden state.
where T is the length of the input sequence (e.g., vi. Dense Layers:
the domain name).
The GRU's final hidden state hT is passed through
ii. Embedding Layer: one or more dense layers:
Figure 17: ROC for CNN on Phishing_1 Table 1: Test Result from the two Datasets
Figure 20: Confusion Matrix for CNN-GRU on
Phishing_1
(2023). Next generation phishing detection and [18] Dilhara, S. (2021). Phishing URL detection: A
prevention system using machine learning. In 2023 1st novel hybrid approach using long short-term memory
and gated recurrent units. International Journal of
International Conference on Advanced Innovations in Computer Applications, 183(44), 41–54.
Smart Cities https://doi.org/10.5120/ijca2021921859
(ICAISC).IEEE,https://doi.org/10.1109/ICAISC56366.2
[19] Ujah-Ogbuagu, U., et al. (2024). A hybrid deep
023.10085529 learning technique for spoofing website URL detection
in real-time applications. IEEE Access, 12(4), 123–135.
[12] Dalia, M., Rahman, H., and Iftikhar, M. (2021).
[20] Dalia, M., and Bhandari, D. (2021). Effective
Detecting malicious URLs using machine learning
phishing emails detection method. International Journal
techniques: Review and research directions. ACM
of Computer Applications, 182(2), 25-30.
Computing Surveys, 54(6), 1-35.
https://doi.org/10.5120/ijca2021922153
https://doi.org/10.1145/3447945