A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users’ confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraud...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Mdpi
2023
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/11582/1/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf http://eprints.uthm.edu.my/11582/2/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf http://eprints.uthm.edu.my/11582/ https://doi.org/10.3390/s23094284 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uthm.eprints.11582 |
---|---|
record_format |
eprints |
spelling |
my.uthm.eprints.115822024-09-03T08:50:48Z http://eprints.uthm.edu.my/11582/ A Honeybee-Inspired Framework for a Smart City Free of Internet Scams Ali Ahmed, Abdulghani Al-Bayatti, Ali Saif, Mubarak A. Jabbar, Waheb H. Rassem, Taha T Technology (General) Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users’ confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraudulent attempts. Internet scammers often use phishing attacks, which have no boundaries, since they could exceed hijacking conventional cyber ecosystems to hack intelligent systems, which emerged recently for the use within smart cities. This paper therefore develops a real-time framework inspired by the honeybee defense mechanism in nature for filtering phishing website attacks in smart cities. In particular, the proposed framework filters phishing websites through three main phases of investigation: PhishTank-Match (PM), Undesirable-Absent (UA), and Desirable-Present (DP) investigation phases. The PM phase is used at first in order to check whether the requested URL is listed in the blacklist of the PhishTank database. On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. The obtained results show that the proposed framework is deployable and capable of filtering various types of phishing website by maintaining a low rate of false alarms. Mdpi 2023 Article PeerReviewed text en http://eprints.uthm.edu.my/11582/1/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf text en http://eprints.uthm.edu.my/11582/2/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf Ali Ahmed, Abdulghani and Al-Bayatti, Ali and Saif, Mubarak and A. Jabbar, Waheb and H. Rassem, Taha (2023) A Honeybee-Inspired Framework for a Smart City Free of Internet Scams. Sensors, 23 (4284). pp. 1-14. https://doi.org/10.3390/s23094284 |
institution |
Universiti Tun Hussein Onn Malaysia |
building |
UTHM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tun Hussein Onn Malaysia |
content_source |
UTHM Institutional Repository |
url_provider |
http://eprints.uthm.edu.my/ |
language |
English English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Ali Ahmed, Abdulghani Al-Bayatti, Ali Saif, Mubarak A. Jabbar, Waheb H. Rassem, Taha A Honeybee-Inspired Framework for a Smart City Free of Internet Scams |
description |
Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users’ confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraudulent attempts. Internet scammers often use phishing attacks, which have no boundaries, since they could exceed hijacking conventional cyber ecosystems to hack intelligent systems, which emerged recently for the use within smart cities. This paper therefore develops a real-time framework
inspired by the honeybee defense mechanism in nature for filtering phishing website attacks in smart cities. In particular, the proposed framework filters phishing websites through three main phases of investigation: PhishTank-Match (PM), Undesirable-Absent (UA), and Desirable-Present (DP) investigation phases. The PM phase is used at first in order to check whether the requested URL is listed in the blacklist of the PhishTank database. On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. The obtained results show that the proposed framework is deployable and capable of filtering various types of phishing
website by maintaining a low rate of false alarms. |
format |
Article |
author |
Ali Ahmed, Abdulghani Al-Bayatti, Ali Saif, Mubarak A. Jabbar, Waheb H. Rassem, Taha |
author_facet |
Ali Ahmed, Abdulghani Al-Bayatti, Ali Saif, Mubarak A. Jabbar, Waheb H. Rassem, Taha |
author_sort |
Ali Ahmed, Abdulghani |
title |
A Honeybee-Inspired Framework for a Smart City Free of
Internet Scams |
title_short |
A Honeybee-Inspired Framework for a Smart City Free of
Internet Scams |
title_full |
A Honeybee-Inspired Framework for a Smart City Free of
Internet Scams |
title_fullStr |
A Honeybee-Inspired Framework for a Smart City Free of
Internet Scams |
title_full_unstemmed |
A Honeybee-Inspired Framework for a Smart City Free of
Internet Scams |
title_sort |
honeybee-inspired framework for a smart city free of
internet scams |
publisher |
Mdpi |
publishDate |
2023 |
url |
http://eprints.uthm.edu.my/11582/1/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf http://eprints.uthm.edu.my/11582/2/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf http://eprints.uthm.edu.my/11582/ https://doi.org/10.3390/s23094284 |
_version_ |
1811687204215324672 |
score |
13.214268 |