MINI PROJECT
XBNET CLASSIFIER IN PHISHING ATTACK
DETECTION
GUIDED BY:
DR.CHANDRA MOULI P.V.S.S.R.
ASSOCIATE PROFESSOR
HEAD OF THE DEPARTMENT
DEPARTMENT OF COMPUTER SCIENCE
PRESENTED BY:
KAVITA – P211307
M.Sc. COMPUTER SCIENCE,
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
• Phishing isa form of cybercrime inwhich a target iscontacted via
email, telephone, or text message by an attacker disguising as a
reputable entity or person.
• XBNet (Extremely Boosted Neural Network), is combination of
tree-based models with neural networks to create a robust
architecture.
• It is trained by using a novel optimization technique, Boosted
Gradient Descent for Tabular Data which increases its
interpretability and performance.
DEPARTMENT OF COMPUTER SCIENCE
INTRODUCTION
The purpose of this project is to help individuals identify these
phishing URLs in order to provide safer practices online.
A popular model for tabular data is boosted trees, a highly
efficacious and extensively used XBNet classifier, and it also
provides good interpretability compared to neural networks
DEPARTMENT OF COMPUTER SCIENCE
AIM OF THE PROJECT
Types of Phishing Tactics
96% of phishing attacks arrive by email.
3% of phishing attacks is done over the telephone.
This is also known as vishing.
1% of phishing attacks is done via text message.
This is known as smishing.
Email
Telephone
Text
Message
DEPARTMENT OF COMPUTER SCIENCE
EXAMPLE
DEPARTMENT OF COMPUTER SCIENCE
30%of phishing emails
are opened by users
12%of these targeted
users click on the
malicious link or
attachment.
97%of the users are
unable to recognize a
sophisticated phishing
email.
2022Phishing Statistics
DEPARTMENT OF COMPUTER SCIENCE
XBNET ON PHISHING
DATASET
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
DATASET
FEATURE
EXTRACTION
DEPARTMENT OF COMPUTER SCIENCE
- =
.
?
@ ~
&
! +
*
, #
$
%
space
Feature Extraction
Lengthof URL,domain, path, query,and fragment
are extracted.
Quantity of specific characters in URL, domain,
path, query, and fragment are extracted. These
characters include:
50 T
otal Features Used in Model
DEPARTMENT OF COMPUTER SCIENCE
Feature Extraction
Using a function from urllib library, protocol, domain, path, query, and
fragment were extracted from the URL and respective columns were created.
The protocol column was dropped as more sophisticated phishing URLs are
labeled secure with https:/.
DEPARTMENT OF COMPUTER SCIENCE
MODEL
SELECTION &
EVALUATION
DEPARTMENT OF COMPUTER SCIENCE
ARCHITECTURE OF XBNET
This architecture consists two parts.
Firstly, instead of randomly initializing weights for gradient
descent in the first iteration, we train our tree first and the feature
importance given by the tree are used as weights in the first
iteration.
Secondly, we decrease the magnitude of the value of feature
importance as given in the algorithm during backward propagation
so that instead of creating a big change in the weights, it just
slightly nudges it, thus not disrupting the process.
DEPARTMENT OF COMPUTER SCIENCE
ARCHITECTURE OF XBNET
Model Evaluation
DEPARTMENT OF COMPUTER SCIENCE
CONCLUSIONS
DEPARTMENT OF COMPUTER SCIENCE
How to Avoid Phishing Attacks
ST
AY INFORMED
Learn about new phishing techniques
that are being developed to avoid
falling prey to one.
UTILIZE ‘FISHING FOR PHISHERS’
When in doubt, use the ‘Fishing for
Phishers’ app to verify the
authenticity of a website.
THINK BEFORE YOU CLICK
Never click on hyperlinks
without examining the hidden
URL.
1
2
3
DEPARTMENT OF COMPUTER SCIENCE
XBNet requires more time and resources for training as we train a gradient-boosted
tree in every layer.
Currently, XBNet only works on tabular data and is unable to process unstructured
data. If it is extended for usage in unstructured data, the number of parameters will
see a drastic jump, and hence care has to be taken with respect to it.
DEPARTMENT OF COMPUTER SCIENCE
LIMITATION AND FUTURE WORK
Thank you!
Any questions?
DEPARTMENT OF COMPUTER SCIENCE
REFERENCES
Sarkar T."XBNet: An extremely
boosted neural network", Intelligent
Systems with Applications, Vol.15
2022,
https://doi.org/10.1016/j.iswa.2022.
200097

Phishing Detection .pptx

  • 1.
    MINI PROJECT XBNET CLASSIFIERIN PHISHING ATTACK DETECTION GUIDED BY: DR.CHANDRA MOULI P.V.S.S.R. ASSOCIATE PROFESSOR HEAD OF THE DEPARTMENT DEPARTMENT OF COMPUTER SCIENCE PRESENTED BY: KAVITA – P211307 M.Sc. COMPUTER SCIENCE, DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF COMPUTER SCIENCE
  • 2.
    • Phishing isaform of cybercrime inwhich a target iscontacted via email, telephone, or text message by an attacker disguising as a reputable entity or person. • XBNet (Extremely Boosted Neural Network), is combination of tree-based models with neural networks to create a robust architecture. • It is trained by using a novel optimization technique, Boosted Gradient Descent for Tabular Data which increases its interpretability and performance. DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION
  • 3.
    The purpose ofthis project is to help individuals identify these phishing URLs in order to provide safer practices online. A popular model for tabular data is boosted trees, a highly efficacious and extensively used XBNet classifier, and it also provides good interpretability compared to neural networks DEPARTMENT OF COMPUTER SCIENCE AIM OF THE PROJECT
  • 4.
    Types of PhishingTactics 96% of phishing attacks arrive by email. 3% of phishing attacks is done over the telephone. This is also known as vishing. 1% of phishing attacks is done via text message. This is known as smishing. Email Telephone Text Message DEPARTMENT OF COMPUTER SCIENCE
  • 5.
  • 6.
    30%of phishing emails areopened by users 12%of these targeted users click on the malicious link or attachment. 97%of the users are unable to recognize a sophisticated phishing email. 2022Phishing Statistics DEPARTMENT OF COMPUTER SCIENCE
  • 7.
  • 8.
    DEPARTMENT OF COMPUTERSCIENCE DATASET
  • 9.
  • 10.
    - = . ? @ ~ & !+ * , # $ % space Feature Extraction Lengthof URL,domain, path, query,and fragment are extracted. Quantity of specific characters in URL, domain, path, query, and fragment are extracted. These characters include: 50 T otal Features Used in Model DEPARTMENT OF COMPUTER SCIENCE
  • 11.
    Feature Extraction Using afunction from urllib library, protocol, domain, path, query, and fragment were extracted from the URL and respective columns were created. The protocol column was dropped as more sophisticated phishing URLs are labeled secure with https:/. DEPARTMENT OF COMPUTER SCIENCE
  • 12.
  • 13.
  • 14.
    This architecture consiststwo parts. Firstly, instead of randomly initializing weights for gradient descent in the first iteration, we train our tree first and the feature importance given by the tree are used as weights in the first iteration. Secondly, we decrease the magnitude of the value of feature importance as given in the algorithm during backward propagation so that instead of creating a big change in the weights, it just slightly nudges it, thus not disrupting the process. DEPARTMENT OF COMPUTER SCIENCE ARCHITECTURE OF XBNET
  • 15.
  • 16.
  • 17.
    How to AvoidPhishing Attacks ST AY INFORMED Learn about new phishing techniques that are being developed to avoid falling prey to one. UTILIZE ‘FISHING FOR PHISHERS’ When in doubt, use the ‘Fishing for Phishers’ app to verify the authenticity of a website. THINK BEFORE YOU CLICK Never click on hyperlinks without examining the hidden URL. 1 2 3 DEPARTMENT OF COMPUTER SCIENCE
  • 18.
    XBNet requires moretime and resources for training as we train a gradient-boosted tree in every layer. Currently, XBNet only works on tabular data and is unable to process unstructured data. If it is extended for usage in unstructured data, the number of parameters will see a drastic jump, and hence care has to be taken with respect to it. DEPARTMENT OF COMPUTER SCIENCE LIMITATION AND FUTURE WORK
  • 19.
  • 20.
    REFERENCES Sarkar T."XBNet: Anextremely boosted neural network", Intelligent Systems with Applications, Vol.15 2022, https://doi.org/10.1016/j.iswa.2022. 200097