Abstract
Clone phishing is one of the most common social engineering attacks that organizations, governments, and the general public have to deal with. The threat posed by clone emails has increased dramatically over the past few years and necessitates the development of an appropriate clone detection system. To combat this threat, this research study utilizes machine learning strategies to predict clone phishing by detecting clone emails. This article discusses the deep learning-based clone phishing prevention prototype, a multi-modal deep neural network (DNet) to recognize and avoid clone phishing attacks. The database is split to train the detection model and then use test data to confirm the findings in order to collect inherent characteristics of the email text and other parameters that can be classified as clone and non-clone. While comparing the proposed model with the other existing techniques, the results show that the proposed DNet model is comparatively more accurate and successful.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444
Reddy, Ramadevi Y, Sunitha KVN (2016) Effective discriminant function for intrusion detection using SVM. In: Proceedings of international conference on advances in computing, communications and informatics (ICAC), Sept 2016, pp 1148–1153
Ingre, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: Proceedings of international conference on signal processing and communication engineering systems, Jan 2015, pp 92–96
Farnaaz, Jabbar MA (2016) Random forest modelling for network intrusion detection system. Procedia Comput Sci 89:213–217
Khan, Jain N (2016) A survey on intrusion detection systems and classification techniques. Int J Sci Res Sci Eng Technol 2(5):202–208
Tang, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software-defined networking. In: Proceedings of international conference on wireless networks and mobile communications (WINCOM), Oct 2016, pp 258–263
Ashfaq, Wang X-Z, Huang JZ, Abbas H, He Y-L (2017) Fuzziness based semi-supervised learning approach for an intrusion detection system. Inf Sci 378:484–497
Ashfaq, Wang X-Z, Huang JZ, Abbas H, He Y-L (2018) Fuzziness based semi-supervised learning approach for an intrusion detection system. Inf Sci 378:484–497
Chang, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: Proceedings of IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), July 2017, pp 635–638
Zhao, Yan R, Chen Z, Mao K, Wang P, Gao RX (2016) Deep learning and its applications to machine health monitoring: a survey. IEEE Trans. Neural Netw. Learn. Syst. [Online]. http://arxiv.org/abs/1612.07640
Vincent, Larochelle H, Lajoie I, Bengio Y, Manzagol P-A (2010) Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J Mach Learn Res 11:3371–3408
You, Li Y, Wang Y, Zhang J, Yang Y (2016) A deep learning-based RNNs model for an automatic security audit of short messages. In: Proceedings of 16th international symposium on communications and information technologies (ISCIT), Qingdao, China, Sept 2016, pp 225–229
Sherubha (2020) Graph-based event measurement for analyzing distributed anomalies in sensor networks. Sådhanå (Springer) 45:212. https://doi.org/10.1007/s12046-020-01451-w
Sherubha (2019) An efficient network threat detection and classification method using ANP-MVPS algorithm in wireless sensor networks. Int J Innov Technol Explor Eng (IJITEE) 8(11). ISSN 2278-3075
Sherubha (2021) An efficient intrusion detection and authentication mechanism for detecting clone attack in wireless sensor networks. J Adv Res Dyn Control Syst (JARDCS) 11(5):55–68
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, B.S.H.S., Fathima, M., Sameer, M., Mahesh, T.T., Dinesh Kumar, A., Padmanaban, K. (2023). Modelling an Efficient Approach to Analyse Clone Phishing and Predict Cyber-Crimes. In: Shakya, S., Papakostas, G., Kamel, K.A. (eds) Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies, vol 166. Springer, Singapore. https://doi.org/10.1007/978-981-99-0835-6_13
Download citation
DOI: https://doi.org/10.1007/978-981-99-0835-6_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0834-9
Online ISBN: 978-981-99-0835-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)