A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities

Authors

  • B. Deena Divya Nayomi Assistant Professor, Department of computer science and Engineering, G.Pullaiah college of Engineering and Technology
  • S. Suguna Mallika Professor, Department of Computer Science and Engineering, CVR College of Engineering, Vastunagar, Ibrahim patan, R.R. District-501510, Telangana, India
  • Sowmya T. Assistant professor CMR Institute of Technology Bengaluru.
  • Janardhan G. Associate professor, Department of CSE, Vignan Institute of Technology and Science, Deshmukhi(V),Pochampelly(M), Yadadiri ,Bhuvanagiri(D),Telangana(S).India
  • P. Laxmikanth Associate Professor, Department of CSE Vignan Institute of Technology and Science.
  • M. Bhavsingh Associate Professor, Department of Computer Science and Engineering, Ashoka Womens Engineering College, Kurnool, Andhra Pradesh, India

Keywords:

cloud-assisted framework, blockchain technology, machine learning, artificial intelligence, phishing attacks, smart cities

Abstract

Phishing attacks are a major Cybersecurity threat, especially in smart cities. In recent years, there has been a growing trend of phishing attacks targeting smart city infrastructure. These attacks can have a significant impact on the safety and security of smart cities. This paper presents a cloud-assisted framework for countering phishing attacks in smart cities. The framework uses a combination of machine learning and blockchain technologies to detect and prevent phishing attacks. The framework was evaluated using a dataset of phishing emails and was shown to be effective in detecting phishing attacks with high accuracy. Experimental results demonstrate the framework's effectiveness in detecting and blocking phishing attacks, providing accurate and timely responses. Moreover, the framework offers cost-efficiency in terms of implementation and maintenance. Evaluation metrics encompass the number of successfully detected and blocked attacks, the efficiency of the detection and prevention process, the accuracy of the machine learning and artificial intelligence models, and cost considerations. The quantitative results of the evaluation showed that the framework performed well in countering phishing attacks in smart cities. The accuracy ranged from 0.92 to 0.95, the precision scores ranged from 0.91 to 0.94, the recall rates ranged from 0.93 to 0.96, and the F1 score ranged from 0.92 to 0.95. The false positive rates ranged from 0.09 to 0.05, and the false negative rates ranged from 0.07 to 0.04. The true positive rates ranged from 0.93 to 0.96, and the true negative rates ranged from 0.91 to 0.94. The area under the ROC curve (AUC) ranged from 0.95 to 0.97. The framework demonstrated low training times of 30 to 60 seconds and fast inference times of 5 to 10 milliseconds. Resource utilization ranged from 80% to 75%. The framework exhibits high scalability and robustness. Making it suitable for deployment in real-world environments.

Downloads

Download data is not yet available.

References

Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal, 4(5), 1125-1142.

Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2023). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors, 25, 100612.

Virat, M. S., Bindu, S. M., Aishwarya, B., Dhanush, B. N., & Kounte, M. R. (2018, May). Security and privacy challenges in internet of things. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 454-460). IEEE.

Lynch, J. (2005). Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks. Berkeley Tech. LJ, 20, 259.

G, P., Dunna, N. R., & Kaipa , C. S. (2023). Enhancing Cloud-Based IoT Security: Integrating AI and Cyber security Measures. International Journal of Computer Engineering in Research Trends, 10(5), 26–32.

M, P., & K, D. S. D. (2023). ICN Scheme and Proxy re-encryption for Privacy Data Sharing on the Block Chain. International Journal of Computer Engineering in Research Trends, 10(4), 172–176.

Ravikumar, G. ., Begum, Z. ., Kumar, A. S. ., Kiranmai, V., Bhavsingh, M., & Kumar, O. K. . (2022). Cloud Host Selection using Iterative Particle-Swarm Optimization for Dynamic Container Consolidation. International Journal on Recent and Innovation Trends in Computing and Communication, 10(1s), 247–253. https://doi.org/10.17762/ijritcc.v10i1s.5846

Yedukondalu, G., Samunnisa, K., Bhavsingh, M., Raghuram, I. S., & Lavanya, A. (2022). MOCF: A multi-objective clustering framework using an improved particle swarm optimization algorithm. International Journal on Recent and Innovation Trends in Computing and Communication, 10(10), 143-154. doi:10.17762/ijritcc.v10i10.5743

M, B. M., M, S., & S, H. (2023). Blockchain-Based Crowd funding Platform. International Journal of Computer Engineering in Research Trends, 10(5), 40–47. https://doi.org/10.22362/ijcert.v10i5.46

Butt, U. A., Amin, R., Aldabbas, H., Mohan, S., Alouffi, B., & Ahmadian, A. (2023). Cloud-based email phishing attack using machine and deep learning algorithm. Complex & Intelligent Systems, 9(3), 3043-3070.

Cui, P., & Guin, U. (2019, July). Countering botnet of things using blockchain-based authenticity framework. In 2019 IEEE computer society annual symposium on VLSI (ISVLSI) (pp. 598-603). IEEE.

Mishra, A., Hsu, C. H., Arya, V., Chaurasia, P., & Li, P. (2021, September). A Hybrid Approach for Protection Against Rumours in a IoT Enabled Smart City Environment. In International Conference on Cyber Security, Privacy and Networking (pp. 101-109). Cham: Springer International Publishing.

Sujatha, G., Ayyannan, M., Priya, S. G., Arun, V., Arularasan, A. N., & Kumar, M. J. (2023, February). Hybrid Optimization Algorithm to Mitigate Phishing URL Attacks In Smart Cities. In 2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM) (pp. 1-5). IEEE.

Kumar, N., Goel, V., Ranjan, R., Altuwairiqi, M., Alyami, H., & Asakipaam, S. A. (2023). A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City. Security and Communication Networks, 2023.

Pasha, M. J., Pingili, M., Sreenivasulu, K., Bhavsingh, M., Saheb, S. I., & Saleh, A. (2022). Bug2 algorithm-based data fusion using mobile element for IoT-enabled wireless sensor networks. Measurement: Sensors, 24, 100548.

Prakash, P. S., Janardhan, M., Sreenivasulu, K., Saheb, S. I., Neeha, S., & Bhavsingh, M. (2022). Mixed Linear Programming for Charging Vehicle Scheduling in Large-Scale Rechargeable WSNs. Journal of Sensors, 2022.

Assegie, T. A. (2021). An optimized KNN model for signature-based malware detection. Tsehay Admassu Assegie." An Optimized KNN Model for Signature-Based Malware Detection". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN, 2349-7084.

Thorat, S. S., Ashwini, M., Kelshikar, A., Londhe, S., & Choudhary, M. (2017). IoT based smart parking system using rfid. International Journal of Computer Engineering In Research Trends, 4(1), 9-12.

Aldakheel, E. A., Zakariah, M., Gashgari, G. A., Almarshad, F. A., & Alzahrani, A. I. (2023). A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators. Sensors, 23(9), 4403.

Kumar, V. K. A., Kumar, M. R., Shribala, N., Singh, N., Gunjan, V. K., Siddiquee, K. N., & Arif, M. (2022). Dynamic Wavelength Scheduling by Multiobjectives in OBS Networks. In N. Jan (Ed.), Journal of Mathematics (Vol. 2022, pp. 1–10). Hindawi Limited. https://doi.org/10.1155/2022/3806018

Revathy, S. ., & Priya, S. S. . (2023). Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 156–160. https://doi.org/10.17762/ijritcc.v11i4s.6322

Kanna, D. ., & Muda, I. . (2021). Hybrid Stacked LSTM Based Classification in Prediction of Weather Forecasting Using Deep Learning. Research Journal of Computer Systems and Engineering, 2(1), 46:51. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/22

Kumar, S. A. S., Naveen, R., Dhabliya, D., Shankar, B. M., & Rajesh, B. N. (2020). Electronic currency note sterilizer machine. Paper presented at the Materials Today: Proceedings,37(Part 2) 1442-1444. doi:10.1016/j.matpr.2020.07.064 Retrieved from www.scopus.com

Downloads

Published

02.09.2023

How to Cite

Nayomi, B. D. D. ., Mallika, S. S. ., T., S. ., G., J. ., Laxmikanth, P. ., & Bhavsingh, M. . (2023). A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 313–327. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3419

Issue

Section

Research Article