Cited 8 time in
Evolutionary Optimization of Neuro-Symbolic Integration for Phishing URL Detection
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Park, Kyoung-Won | - |
| dc.contributor.author | Bu, Seok-Jun | - |
| dc.contributor.author | Cho, Sung-Bae | - |
| dc.date.accessioned | 2024-12-03T02:01:02Z | - |
| dc.date.available | 2024-12-03T02:01:02Z | - |
| dc.date.issued | 2021-09 | - |
| dc.identifier.issn | 0302-9743 | - |
| dc.identifier.issn | 1611-3349 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/73668 | - |
| dc.description.abstract | A phishing attack is defined as a type of cybersecurity attack that uses URLs that lead to phishing sites and steals credentials and personal information. Since there is a limitation on traditional deep learning to detect phishing URLs from only the linguistic features of URLs, attempts have been made to detect the misclassified URLs by integrating security expert knowledge with deep learning. In this paper, a genetic algorithm is proposed to find combinatorial optimization of logic programmed constraints and deep learning from given 13 components, which are 12 rule-based symbol components and a neural component. The genetic algorithm explores numerous searching spaces of combinations of 12 rules with deep learning to get an optimal combination of the components. Experiments and 10-fold cross-validation with three different real-world datasets show that the proposed method outperforms the state-of-the-art performance of β -discrepancy integration approach by achieving a 1.47% accuracy and a 2.82% recall improvement. In addition, a post-analysis of the proposed method is performed to justify the feasibility of phishing URL detection via analyzing URLs that are misclassified from either the neural or symbolic networks. © 2021, Springer Nature Switzerland AG. | - |
| dc.format.extent | 13 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Springer Verlag | - |
| dc.title | Evolutionary Optimization of Neuro-Symbolic Integration for Phishing URL Detection | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1007/978-3-030-86271-8_8 | - |
| dc.identifier.scopusid | 2-s2.0-85115885659 | - |
| dc.identifier.bibliographicCitation | Lecture Notes in Computer Science, v.12886 LNAI, pp 88 - 100 | - |
| dc.citation.title | Lecture Notes in Computer Science | - |
| dc.citation.volume | 12886 LNAI | - |
| dc.citation.startPage | 88 | - |
| dc.citation.endPage | 100 | - |
| dc.type.docType | Conference paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Genetic algorithm | - |
| dc.subject.keywordAuthor | Neuro-symbolic integration | - |
| dc.subject.keywordAuthor | Phishing detection | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
