Do, Nguyet Quang and Selamat, Ali and Krejcar, Ondrej and Herrera-Viedma, Enrique and Fujita, Hamido (2022) Deep learning for phishing detection: Taxonomy, current challenges and future directions. IEEE Access, 10 (NA). pp. 36429-36463. ISSN 2169-3536
PDF
1MB |
Official URL: http://dx.doi.org/10.1109/ACCESS.2022.3151903
Abstract
Phishing has become an increasing concern and captured the attention of end-users as well as security experts. Existing phishing detection techniques still suffer from the deficiency in performance accuracy and inability to detect unknown attacks despite decades of development and improvement. Motivated to solve these problems, many researchers in the cybersecurity domain have shifted their attention to phishing detection that capitalizes on machine learning techniques. Deep learning has emerged as a branch of machine learning that becomes a promising solution for phishing detection in recent years. As a result, this study proposes a taxonomy of deep learning algorithm for phishing detection by examining 81 selected papers using a systematic literature review approach. The paper first introduces the concept of phishing and deep learning in the context of cybersecurity. Then, taxonomies of phishing detection and deep learning algorithm are provided to classify the existing literature into various categories. Next, taking the proposed taxonomy as a baseline, this study comprehensively reviews the state-of-the-art deep learning techniques and analyzes their advantages as well as disadvantages. Subsequently, the paper discusses various issues that deep learning faces in phishing detection and proposes future research directions to overcome these challenges. Finally, an empirical analysis is conducted to evaluate the performance of various deep learning techniques in a practical context, and to highlight the related issues that motivate researchers in their future works. The results obtained from the empirical experiment showed that the common issues among most of the state-of-the-art deep learning algorithms are manual parameter-tuning, long training time, and deficient detection accuracy.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Cybersecurity, deep learning, machine learning, phishing detection |
Subjects: | T Technology > T Technology (General) |
Divisions: | Malaysia-Japan International Institute of Technology |
ID Code: | 104302 |
Deposited By: | Widya Wahid |
Deposited On: | 04 Feb 2024 02:43 |
Last Modified: | 04 Feb 2024 02:43 |
Repository Staff Only: item control page