CFP last date
20 May 2024
Reseach Article

Phishing Detection Implementation using Databricks and Artificial Intelligence

by Dinesh Kalla, Fnu Samaah, Sivaraju Kuraku, Nathan Smith
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 11
Year of Publication: 2023
Authors: Dinesh Kalla, Fnu Samaah, Sivaraju Kuraku, Nathan Smith
10.5120/ijca2023922764

Dinesh Kalla, Fnu Samaah, Sivaraju Kuraku, Nathan Smith . Phishing Detection Implementation using Databricks and Artificial Intelligence. International Journal of Computer Applications. 185, 11 ( May 2023), 1-11. DOI=10.5120/ijca2023922764

@article{ 10.5120/ijca2023922764,
author = { Dinesh Kalla, Fnu Samaah, Sivaraju Kuraku, Nathan Smith },
title = { Phishing Detection Implementation using Databricks and Artificial Intelligence },
journal = { International Journal of Computer Applications },
issue_date = { May 2023 },
volume = { 185 },
number = { 11 },
month = { May },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number11/32742-2023922764/ },
doi = { 10.5120/ijca2023922764 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:25:48.931021+05:30
%A Dinesh Kalla
%A Fnu Samaah
%A Sivaraju Kuraku
%A Nathan Smith
%T Phishing Detection Implementation using Databricks and Artificial Intelligence
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 11
%P 1-11
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Phishing is a fraudulent activity that includes tricking people into disclosing personal or financial information by impersonating a legitimate company or individual. The increasingly complex nature of phishing has drawn the attention of criminals, who see it as a profitable and simple way to get sensitive information. As a result of the negative impact of phishing assaults on both individuals and companies, efficient detection and prevention measures have been developed. This document overviews numerous approaches for detecting and thwarting phishing attacks. The research introduces the Phishcatch algorithm, which has shown substantial success in identifying phishing emails and alerting consumers to fraudulent attempts. Phishcatch studies user behavior on websites and limits access if any suspicious behavior is found. Phishcatch is a vital instrument in the battle against phishing attempts, with an accuracy and detection rate of 90%. Furthermore, this article explains the steps in developing, testing and implementing successful anti-phishing algorithms.

References
  1. Akinyelu, A. A. (2019). Machine learning and nature-inspired based phishing detection: a literature survey. International Journal on Artificial Intelligence Tools, 28(05), 1930002.
  2. Chan, J. M., Van Blarigan, E. L., Langlais, C. S., Zhao, S., Ramsdill, J. W., Daniel, K., ... & Winters-Stone, K. M. (2020). Feasibility and acceptability of a remotely delivered, web-based behavioral intervention for men with prostate cancer: a four-arm randomized controlled pilot trial. Journal of medical Internet research, 22(12), e19238.
  3. Dinesh K; Nathan S. "Study and Analysis of Chat GPT and its Impact on Different Fields of Study." Volume. 8 Issue. 3, March - 2023, International Journal of Innovative Science and Research Technology (IJISRT), www.ijisrt.com. ISSN - 2456-2165, PP :- 827-833. https://doi.org/10.5281/zenodo.7767675
  4. Hakim, Z. M., Ebner, N. C., Oliveira, D. S., Getz, S. J., Levin, B. E., Lin, T., ... & Wilson, R. C. (2021). The Phishing Email Suspicion Test (PEST) is a lab-based task for evaluating the cognitive mechanisms of phishing detection. Behavior research methods, 53, 1342-1352.
  5. Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., Khayami, R., Choo, K. K. R., & Newton, D. E. (2019). DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer. Future Generation Computer Systems, pp. 90, 94–104.
  6. Kalla, D., & Samaah, F. (2020a). Chatbot for Medical Treatment using NLTK Lib. IOSR Journal of Computer Engineering, 22(1), 50–56. https://doi.org/10.9790/0661-2201035056
  7. Lopez-Aguilar, P., & Solanas, A. (2021). The Role of Phishing Victims’ Neuroticism: Reasons Behind the Lack of Consensus. Int'l J. Info. Sec. & Cybercrime, 10, 75.
  8. Marzuki, K., Hanif, N., & Hariyadi, I. P. (2022). Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Antivirus: The Analysis on Mail Servers. International Journal of Electronics and Communications Systems, 2(2), 65-73.
  9. Mishra, S., & Soni, D. (2021). Dsmishsms-a system to detect smishing sms. Neural Computing and Applications, pp. 1–18.
  10. Negassa, M. D., Mallie, D. T., & Gemeda, D. O. (2020). Forest cover change detection using Geographic Information Systems and remote sensing techniques: a spatiotemporal study on Komto Protected Forest priority area, East Wollega Zone, Ethiopia. Environmental Systems Research, 9, 1-14.
  11. Oesch, S., & Ruoti, S. (2020, August). That was then; this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers. In Proceedings of the 29th USENIX Conference on Security Symposium (pp. 2165-2182).
  12. Petelka, J., Zou, Y., & Schaub, F. (2019, May). Put your warning where your link is: Improving and evaluating email phishing warnings in Proceedings of the 2019 CHI conference on human factors in computing systems (pp. 1-15).
  13. Qwaider, S. R. H. (2019). ANALYSIS AND EVALUATION OF CYBERSECURITY TECHNIQUES FOR SOCIAL ENGINEERING (Doctoral dissertation).
  14. Riadi, I., Umar, R., Busthomi, I., & Muhammad, A. W. (2022). Block-hash of blockchain framework against man-in-the-middle attacks. Register: Jurnal Ilmiah Teknologi Sistem Informasi, 8(1), 1-9.
  15. Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine learning-based phishing detection from URLs. Expert Systems with Applications, 117, 345-357.
  16. Sharma, A., Gupta, P., & Noida, I. (2020). COVID 19 PANDEMIC: IMPACT ON BUSINESS AND CYBER SECURITY CHALLENGES. Journal of Emerging Technologies and Innovative Research (JETIR), 7(7).
  17. Shen, G., Link, S. S., Tao, X., & Frankfort, B. J. (2020). Modeling a potential SANS countermeasure by manipulating the translaminar pressure difference in mice. npj Microgravity, 6(1), 19.
  18. Kuraku, S.; Kalla, D. Emotet Malware–A Banking Credentials Stealer. Iosr J. Comput. Eng. 2020, 22, 31–41.
  19. Xu, D. (2019). Jamming-assisted legitimate surveillance of suspicious interference networks with successive interference cancellation. IEEE Communications Letters, 24(2), 396–400.
  20. Yathiraju, N., Jakka, G., Parisa, S. K., & Oni, O. (2022). Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security: A Survey of Social Engineering Attacks and Steps for Mitigation of These Attacks. In Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (pp. 110-132). IGI Global.
  21. Zhang, L., Tan, S., Wang, Z., Ren, Y., Wang, Z., & Yang, J. (2020, December). Viblive: A continuous liveness detection for a secure voice user interface in an IoT environment. In Annual Computer Security Applications Conference (pp. 884-896).
Index Terms

Computer Science
Information Sciences

Keywords

Phishing NLTK Natural Language Processing Azure Databricks Spam Security Situational Awareness Credential Theft Python Machine Learning Stemming and Lemmatization Naïve Bayes Artificial Intelligence.