Skip to main content

Modelling an Efficient Approach to Analyse Clone Phishing and Predict Cyber-Crimes

  • Conference paper
  • First Online:
Mobile Computing and Sustainable Informatics

Abstract

Clone phishing is one of the most common social engineering attacks that organizations, governments, and the general public have to deal with. The threat posed by clone emails has increased dramatically over the past few years and necessitates the development of an appropriate clone detection system. To combat this threat, this research study utilizes machine learning strategies to predict clone phishing by detecting clone emails. This article discusses the deep learning-based clone phishing prevention prototype, a multi-modal deep neural network (DNet) to recognize and avoid clone phishing attacks. The database is split to train the detection model and then use test data to confirm the findings in order to collect inherent characteristics of the email text and other parameters that can be classified as clone and non-clone. While comparing the proposed model with the other existing techniques, the results show that the proposed DNet model is comparatively more accurate and successful.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444

    Article  Google Scholar 

  2. Reddy, Ramadevi Y, Sunitha KVN (2016) Effective discriminant function for intrusion detection using SVM. In: Proceedings of international conference on advances in computing, communications and informatics (ICAC), Sept 2016, pp 1148–1153

    Google Scholar 

  3. Ingre, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: Proceedings of international conference on signal processing and communication engineering systems, Jan 2015, pp 92–96

    Google Scholar 

  4. Farnaaz, Jabbar MA (2016) Random forest modelling for network intrusion detection system. Procedia Comput Sci 89:213–217

    Google Scholar 

  5. Khan, Jain N (2016) A survey on intrusion detection systems and classification techniques. Int J Sci Res Sci Eng Technol 2(5):202–208

    Google Scholar 

  6. Tang, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software-defined networking. In: Proceedings of international conference on wireless networks and mobile communications (WINCOM), Oct 2016, pp 258–263

    Google Scholar 

  7. Ashfaq, Wang X-Z, Huang JZ, Abbas H, He Y-L (2017) Fuzziness based semi-supervised learning approach for an intrusion detection system. Inf Sci 378:484–497

    Google Scholar 

  8. Ashfaq, Wang X-Z, Huang JZ, Abbas H, He Y-L (2018) Fuzziness based semi-supervised learning approach for an intrusion detection system. Inf Sci 378:484–497

    Google Scholar 

  9. Chang, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: Proceedings of IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), July 2017, pp 635–638

    Google Scholar 

  10. Zhao, Yan R, Chen Z, Mao K, Wang P, Gao RX (2016) Deep learning and its applications to machine health monitoring: a survey. IEEE Trans. Neural Netw. Learn. Syst. [Online]. http://arxiv.org/abs/1612.07640

  11. Vincent, Larochelle H, Lajoie I, Bengio Y, Manzagol P-A (2010) Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J Mach Learn Res 11:3371–3408

    Google Scholar 

  12. You, Li Y, Wang Y, Zhang J, Yang Y (2016) A deep learning-based RNNs model for an automatic security audit of short messages. In: Proceedings of 16th international symposium on communications and information technologies (ISCIT), Qingdao, China, Sept 2016, pp 225–229

    Google Scholar 

  13. Sherubha (2020) Graph-based event measurement for analyzing distributed anomalies in sensor networks. Sådhanå (Springer) 45:212. https://doi.org/10.1007/s12046-020-01451-w

  14. Sherubha (2019) An efficient network threat detection and classification method using ANP-MVPS algorithm in wireless sensor networks. Int J Innov Technol Explor Eng (IJITEE) 8(11). ISSN 2278-3075

    Google Scholar 

  15. Sherubha (2021) An efficient intrusion detection and authentication mechanism for detecting clone attack in wireless sensor networks. J Adv Res Dyn Control Syst (JARDCS) 11(5):55–68

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Dinesh Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, B.S.H.S., Fathima, M., Sameer, M., Mahesh, T.T., Dinesh Kumar, A., Padmanaban, K. (2023). Modelling an Efficient Approach to Analyse Clone Phishing and Predict Cyber-Crimes. In: Shakya, S., Papakostas, G., Kamel, K.A. (eds) Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies, vol 166. Springer, Singapore. https://doi.org/10.1007/978-981-99-0835-6_13

Download citation

Publish with us

Policies and ethics