Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Rajeswary, C.; * | Thirumaran, M.
Affiliations: Department of Computer Science and Engineering, Puducherry Technological University, Puducherry, India
Correspondence: [*] Corresponding author. C. Rajeswary, Department of Computer Science and Engineering, Puducherry Technological University, Puducherry-605014, India. +919047171608; E-mail: [email protected].
Abstract: Phishing is a major problem on darknets. Phishing is the practice of attacking an unaware person by pretending to be someone else to steal their digital data. In anonymous platforms such as the dark web or deep web of Tor, detecting the attacker or phishing attacks is a much more complicated practice. Generic phishing attacks can be easy to spot. Today’s challenge is detecting the various attacks in the anonymous network is very hard. The intelligent factor of attacks can bypass traditional detection solutions. To solve the problem of complications in the Tor Network, this work focuses on the development of automated detection of vulnerable attacks in phishing-based Tor hidden services. The proposed model initially divides the attack parameters into three categories into Class A, Class B, and Class C based on technical perspectives and some defined threshold values. Next, the class A attacks (i.e. top level domain and protocol similarity) attacks are detected by a random forest (RF) classifier. Then, the class B attacks can be identified by the convolutional neural network (CNN). Finally, the LSTM model is applied for the accurate classification of multiple attacks in the Tor network. The experimental validation of the proposed model is tested using the CIRCL and AIL datasets. The experimental values highlighted the promising performance of the proposed model over other methods with a maximum overall detection accuracy of 95.60% and 95.77% on CIRCL and AIL datasets respectively. Therefore, the proposed model effectively detects multiple attacks in the Tor network under dynamic and real-time environments.
Keywords: Phishing detection, attacks, tor network, random forest, CNN, LSTM
DOI: 10.3233/JIFS-224142
Journal: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 6, pp. 8889-8903, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]