Machine learning as a key tool in defensive cyber operations: the effectiveness of phishing threat detection

Keywords: cybersecurity, machine learning, phishing, defensive operations, URL analysis

Abstract

Purpose: to determine the effectiveness of using machine learning algorithms for detecting phishing threats within the scope of defensive cyber operations.

Method: utilization of random forest algorithms, logistic regression, and supporting vector machines for automated URL analysis. The program is implemented in Python using the Flask framework.

Findings: the developed solution demonstrated high effectiveness in detecting phishing links, showcasing accuracy in analysis when tested on real data sets.

Practical implications: the proposed system can be implemented as part of defensive cyber operations for automated detection of malicious links and enhancement of cybersecurity.

Paper type: theoretical, practical.

Downloads

Download data is not yet available.

References

Mueller, G. B., Jensen, B., Valeriano, B., Maness, R. C., & Macias, J. M. (2023, July 13). Cyber operations during the Russo-Ukrainian war. Center for Strategic and International Studies. Available from : https://www.csis.org/analysis/cyber-operations-during-russo-ukrainian-war

Lewis, J. A. (2022, June 16). Cyber war and Ukraine. Center for Strategic and International Studies. https://www.csis.org/analysis/cyber-war-and-ukraine

Russia’s cyberattack activity in the Ukraine | Security Insider. (2022). Available from : https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/special-report-ukraine/

Freedberg Jr, S. J. (2023, February 16). Russian phishing attacks flooded Ukraine, tripled against NATO nations in 2022: Report – Breaking Defense. Breaking Defense. Available from : https://breakingdefense.com/2023/02/russian-phishing-attacks-flooded-ukraine-tripled-against-nato-nations-in-2022-report/

Fendorf, K., & Miller, J. (2022, March 24). Tracking cyber operations and actors in the russia-ukraine war. Council on Foreign Relations. https://www.cfr.org/blog/tracking-cyber-operations-and-actors-russia-ukraine-war

Daniel, M. (2022). Offensive cyber operations: Understanding intangible warfare. Oxford University Press, Incorporated.

Huskaj, G. (2023). Offensive cyberspace operations for cyber security. International Conference on Cyber Warfare and Security, 18(1), 476–479. https://doi.org/10.34190/iccws.18.1.1054

Porche, I. R., Sollinger, J. M., & McKay, S. (2011). A cyberworm that knows no boundaries. RAND Corporation. https://doi.org/10.7249/op342

Sarker, I. H. (2024). Learning technologies: Toward machine learning and deep learning for cybersecurity. У AI-Driven cybersecurity and threat intelligence: Cyber automation, intelligent decision-making and explainability (S. 43-59). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-54497-2_3

Kapan, S., & Sora Gunal, E. (2023). Improved phishing attack detection with machine learning: A comprehensive evaluation of classifiers and features. Applied Sciences, 13(24). https://doi.org/10.3390/app132413269


Abstract views: 167
PDF Downloads: 94
Published
2024-10-31
How to Cite
Burova, N., Oprysk, R., Kurii, Y., Lakh, Y., & Susukailo, V. (2024). Machine learning as a key tool in defensive cyber operations: the effectiveness of phishing threat detection. Social Development and Security, 14(5), 113-123. https://doi.org/10.33445/sds.2024.14.5.11
Section
Engineering and Technology