Transactions on Machine Intelligence

Transactions on Machine Intelligence

Detection of Phishing Website Attacks in Electronic Banking Using a Principal Component Analysis Algorithm and Multi-Layer Perceptron Neural Network Algorithm

Document Type : Original Article

Author
Department of Computer Science, Islamic Azad University, Yasuj Branch, Yasuj, Iran
Abstract
Phishing, commonly known as the unauthorized acquisition of personal information from users of online platforms and clients of digital stores and financial institutions, has witnessed a notable surge in recent years. This surge has fueled the growth of a thriving criminal enterprise, particularly targeting financial service providers. Given the magnitude of this threat, we adopted a dual approach involving the application of a Principal Component Analysis (PCA) algorithm and a multi-layer perceptron neural network algorithm to identify and combat phishing attacks within the realm of electronic banking. Initially, we employed the PCA algorithm to streamline the identification process, reducing the number of features from an initial 30 to a more manageable 14. Following this feature reduction step, we fine-tuned the accuracy of detecting phishing website attacks using the multi-layer perceptron neural network algorithm. This algorithm, functioning as a binary classification technique, adeptly determines whether an input vector belongs to a specific class. Acting as a linear classifier, it relies on the weighted linear combination of input factors to make predictions. To further fortify our defenses, we implemented the Waka tool, an online algorithm capable of meticulously examining individual inputs. Through the strategic integration of the PCA and multi-layer perceptron neural network algorithms, we achieved a substantial enhancement in the accuracy of detecting phishing website attacks in the electronic banking domain, reaching an impressive 91.64%.
Keywords

  • Samad, S. R. A., Balasubaramanian, S., Al-Kaabi, A. S., Sharma, B., Chowdhury, S., Mehbodniya, A., Webber, J. L., & Bostani, A. (2023). Analysis of the performance impact of fine-tuned machine learning model for phishing URL detection. Electronics.
  • Yun, X., Zhang, Y., Zhou, Y., Xiao, J., Wang, Y., & Li, S. (2013). Method and system for automatic detection of suspected counterfeit websites. China.
  • Raychura, V. D., & Parekh, C. D. (2020). A new deceptive tactic aims better cyber-solutions for organizations during global pandemic. In Proceedings of the 7th International Conference on Cyber Security and Privacy (pp. 834–840).
  • Raghupathi, V., & Raghupathi, W. (2020). The influence of education on health: An empirical assessment of OECD countries for the period 1995–2015. Archives of Public Health, 78. https://doi.org/10.1186/s13690-020-00402-5
  • (2021). APWG Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1–3, 2021.
  • Lin, T.-Y., Maire, M., Belongie, S. J., Hays, J., Perona, P., Ramanan, D., Dollár, P., & Zitnick, C. L. (2014). Microsoft COCO: Common objects in context. In European Conference on Computer Vision (pp. 740–755). https://doi.org/10.1007/978-3-319-10602-1_48
  • Monson, K., Smith, E., & Bajic, S. (2022). Planning, design and logistics of a decision analysis study: The FBI/Ames study involving forensic firearms examiners. Forensic Science International: Synergy, 4, 100221. https://doi.org/10.1016/j.fsisyn.2022.100221
  • Pinguelo, F. M., & Muller, B. W. (2012). Virtual crimes, real damages part II: What businesses can do today to protect themselves from cybercrime, and what public-private partnerships are attempting to achieve for the nation of tomorrow. eBusiness & eCommerce eJournal.
  • Karim, A., Shahroz, M., Mustofa, K., Belhaouari, S., Ramana, S., & Joga, K. (2023). Phishing detection system through hybrid machine learning based on URL. IEEE Access, 11, 36805–36822. https://doi.org/10.1109/ACCESS.2023.3252366
  • Yu, Z., Zhao, C., Wang, Z., Qin, Y., Su, Z., Li, X., ... Zhao, G. (2020). Searching central difference convolutional networks for face anti-spoofing. In 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). https://doi.org/10.1109/CVPR42600.2020.00534
  • Campajola, C., Cristodaro, R., De Collibus, F. M., Yan, T., Vallarano, N., & Tessone, C. (2022). The evolution of centralisation on cryptocurrency platforms. arXiv preprint arXiv:2206.05081.
  • Distler, V. (2023). The influence of context on response to spear-phishing attacks: An in-situ deception study. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/3544548.3581170
  • Haddadnia, J., Seryasat, O. R., & Rabiee, H. (2013). Thyroid diseases diagnosis using probabilistic neural network and principal component analysis. Journal of Basic and Applied Science Research, 3(2), 593–598.
  • Seryasat, O. R., Zadeh, H. G., Ghane, M., Abooalizadeh, Z., Taherkhani, A., & Maleki, F. (2013). Fault diagnosis of ball-bearings using principal component analysis and support-vector machine. Life Science Journal, 10(1s), 393–397.
  • Sood, K., Nosouhi, M., Nguyen, D. D. N., Jiang, F., Chowdhury, M. U., & Doss, R. (2023). Intrusion detection scheme with dimensionality reduction in next generation networks. IEEE Transactions on Information Forensics and Security, 18(4), 965–979. https://doi.org/10.1109/TIFS.2022.3233777
  • Shlens, J. (2014). A tutorial on principal component analysis. arXiv preprint arXiv:1404.1100.
  • Yu, H., Liu, Y., Zhou, G., & Peng, M. (2023). Multilayer perceptron algorithm-assisted flexible piezoresistive PDMS/Chitosan/cMWCNT sponge pressure sensor for sedentary healthcare monitoring. ACS Sensors. https://doi.org/10.1021/acssensors.3c01885
Volume 7, Issue 1
Winter 2024
Pages 38-50

  • Receive Date 20 November 2023
  • Revise Date 01 February 2024
  • Accept Date 18 March 2024