A Honeybee-Inspired Framework for a Smart City Free of Internet Scams

Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users’ confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraud...

Full description

Saved in:
Bibliographic Details
Main Authors: Ali Ahmed, Abdulghani, Al-Bayatti, Ali, Saif, Mubarak, A. Jabbar, Waheb, H. Rassem, Taha
Format: Article
Language:English
English
Published: Mdpi 2023
Subjects:
Online Access:http://eprints.uthm.edu.my/11582/1/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf
http://eprints.uthm.edu.my/11582/2/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf
http://eprints.uthm.edu.my/11582/
https://doi.org/10.3390/s23094284
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uthm.eprints.11582
record_format eprints
spelling my.uthm.eprints.115822024-09-03T08:50:48Z http://eprints.uthm.edu.my/11582/ A Honeybee-Inspired Framework for a Smart City Free of Internet Scams Ali Ahmed, Abdulghani Al-Bayatti, Ali Saif, Mubarak A. Jabbar, Waheb H. Rassem, Taha T Technology (General) Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users’ confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraudulent attempts. Internet scammers often use phishing attacks, which have no boundaries, since they could exceed hijacking conventional cyber ecosystems to hack intelligent systems, which emerged recently for the use within smart cities. This paper therefore develops a real-time framework inspired by the honeybee defense mechanism in nature for filtering phishing website attacks in smart cities. In particular, the proposed framework filters phishing websites through three main phases of investigation: PhishTank-Match (PM), Undesirable-Absent (UA), and Desirable-Present (DP) investigation phases. The PM phase is used at first in order to check whether the requested URL is listed in the blacklist of the PhishTank database. On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. The obtained results show that the proposed framework is deployable and capable of filtering various types of phishing website by maintaining a low rate of false alarms. Mdpi 2023 Article PeerReviewed text en http://eprints.uthm.edu.my/11582/1/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf text en http://eprints.uthm.edu.my/11582/2/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf Ali Ahmed, Abdulghani and Al-Bayatti, Ali and Saif, Mubarak and A. Jabbar, Waheb and H. Rassem, Taha (2023) A Honeybee-Inspired Framework for a Smart City Free of Internet Scams. Sensors, 23 (4284). pp. 1-14. https://doi.org/10.3390/s23094284
institution Universiti Tun Hussein Onn Malaysia
building UTHM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tun Hussein Onn Malaysia
content_source UTHM Institutional Repository
url_provider http://eprints.uthm.edu.my/
language English
English
topic T Technology (General)
spellingShingle T Technology (General)
Ali Ahmed, Abdulghani
Al-Bayatti, Ali
Saif, Mubarak
A. Jabbar, Waheb
H. Rassem, Taha
A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
description Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users’ confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraudulent attempts. Internet scammers often use phishing attacks, which have no boundaries, since they could exceed hijacking conventional cyber ecosystems to hack intelligent systems, which emerged recently for the use within smart cities. This paper therefore develops a real-time framework inspired by the honeybee defense mechanism in nature for filtering phishing website attacks in smart cities. In particular, the proposed framework filters phishing websites through three main phases of investigation: PhishTank-Match (PM), Undesirable-Absent (UA), and Desirable-Present (DP) investigation phases. The PM phase is used at first in order to check whether the requested URL is listed in the blacklist of the PhishTank database. On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. The obtained results show that the proposed framework is deployable and capable of filtering various types of phishing website by maintaining a low rate of false alarms.
format Article
author Ali Ahmed, Abdulghani
Al-Bayatti, Ali
Saif, Mubarak
A. Jabbar, Waheb
H. Rassem, Taha
author_facet Ali Ahmed, Abdulghani
Al-Bayatti, Ali
Saif, Mubarak
A. Jabbar, Waheb
H. Rassem, Taha
author_sort Ali Ahmed, Abdulghani
title A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
title_short A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
title_full A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
title_fullStr A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
title_full_unstemmed A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
title_sort honeybee-inspired framework for a smart city free of internet scams
publisher Mdpi
publishDate 2023
url http://eprints.uthm.edu.my/11582/1/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf
http://eprints.uthm.edu.my/11582/2/J16111_8f5e7f3987a954b227dc88ab579f38f7.pdf
http://eprints.uthm.edu.my/11582/
https://doi.org/10.3390/s23094284
_version_ 1811687204215324672
score 13.214268