Cited 30 time in
Integrating deep learning with first-order logic programmed constraints for zero-day phishing attack detection
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Bu, Seok-Jun | - |
| dc.contributor.author | Cho, Sung-Bae | - |
| dc.date.accessioned | 2024-12-03T02:01:01Z | - |
| dc.date.available | 2024-12-03T02:01:01Z | - |
| dc.date.issued | 2021 | - |
| dc.identifier.issn | 0736-7791 | - |
| dc.identifier.issn | 1520-6149 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/73652 | - |
| dc.description.abstract | Considering the fatality of phishing attacks that are emphasized by many organizations, the inductive learning approach using reported malicious URLs has been verified in the field of deep learning. However, the deep learning-based method mainly focused on the fitting of a classification task via historical URL observation shows a limitation of recall due to the characteristics of zero-day attack. In order to model the nature of a zero-day phishing attack in which URL addresses are generated and discarded immediately, an approach that utilizes the expert knowledge is promising. We introduce the integration method of deep learning and logic programmed domain knowledge to inject the real-world constraints. We design neural and logic classifiers and propose the joint learning method of each component based on the traditional neuro-symbolic integration. Extensive experiments on three real-world datasets consisting of 222,541 URLs showed the highest recall among the latest deep learning methods, despite the hostile class-imbalanced condition. We demonstrate that the optimized weighting between neural and logic component has an effect of improving the recall over 3% compared to the existing methods. | - |
| dc.format.extent | 5 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
| dc.title | Integrating deep learning with first-order logic programmed constraints for zero-day phishing attack detection | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ICASSP39728.2021.9414850 | - |
| dc.identifier.scopusid | 2-s2.0-85115053557 | - |
| dc.identifier.wosid | 000704288402187 | - |
| dc.identifier.bibliographicCitation | ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pp 2685 - 2689 | - |
| dc.citation.title | ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings | - |
| dc.citation.startPage | 2685 | - |
| dc.citation.endPage | 2689 | - |
| dc.type.docType | Proceedings Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Acoustics | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Imaging Science & Photographic Technology | - |
| dc.relation.journalWebOfScienceCategory | Acoustics | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Imaging Science & Photographic Technology | - |
| dc.subject.keywordPlus | CLASSIFICATION | - |
| dc.subject.keywordPlus | MODEL | - |
| dc.subject.keywordAuthor | Phishing Detection | - |
| dc.subject.keywordAuthor | Expert Knowledge | - |
| dc.subject.keywordAuthor | Logic Programming | - |
| dc.subject.keywordAuthor | Triplet Network | - |
| dc.subject.keywordAuthor | Neurosymbolic Integration | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
