A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities
Keywords:
cloud-assisted framework, blockchain technology, machine learning, artificial intelligence, phishing attacks, smart citiesAbstract
Phishing attacks are a major Cybersecurity threat, especially in smart cities. In recent years, there has been a growing trend of phishing attacks targeting smart city infrastructure. These attacks can have a significant impact on the safety and security of smart cities. This paper presents a cloud-assisted framework for countering phishing attacks in smart cities. The framework uses a combination of machine learning and blockchain technologies to detect and prevent phishing attacks. The framework was evaluated using a dataset of phishing emails and was shown to be effective in detecting phishing attacks with high accuracy. Experimental results demonstrate the framework's effectiveness in detecting and blocking phishing attacks, providing accurate and timely responses. Moreover, the framework offers cost-efficiency in terms of implementation and maintenance. Evaluation metrics encompass the number of successfully detected and blocked attacks, the efficiency of the detection and prevention process, the accuracy of the machine learning and artificial intelligence models, and cost considerations. The quantitative results of the evaluation showed that the framework performed well in countering phishing attacks in smart cities. The accuracy ranged from 0.92 to 0.95, the precision scores ranged from 0.91 to 0.94, the recall rates ranged from 0.93 to 0.96, and the F1 score ranged from 0.92 to 0.95. The false positive rates ranged from 0.09 to 0.05, and the false negative rates ranged from 0.07 to 0.04. The true positive rates ranged from 0.93 to 0.96, and the true negative rates ranged from 0.91 to 0.94. The area under the ROC curve (AUC) ranged from 0.95 to 0.97. The framework demonstrated low training times of 30 to 60 seconds and fast inference times of 5 to 10 milliseconds. Resource utilization ranged from 80% to 75%. The framework exhibits high scalability and robustness. Making it suitable for deployment in real-world environments.
Downloads
References
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal, 4(5), 1125-1142.
Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2023). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors, 25, 100612.
Virat, M. S., Bindu, S. M., Aishwarya, B., Dhanush, B. N., & Kounte, M. R. (2018, May). Security and privacy challenges in internet of things. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 454-460). IEEE.
Lynch, J. (2005). Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks. Berkeley Tech. LJ, 20, 259.
G, P., Dunna, N. R., & Kaipa , C. S. (2023). Enhancing Cloud-Based IoT Security: Integrating AI and Cyber security Measures. International Journal of Computer Engineering in Research Trends, 10(5), 26–32.
M, P., & K, D. S. D. (2023). ICN Scheme and Proxy re-encryption for Privacy Data Sharing on the Block Chain. International Journal of Computer Engineering in Research Trends, 10(4), 172–176.
Ravikumar, G. ., Begum, Z. ., Kumar, A. S. ., Kiranmai, V., Bhavsingh, M., & Kumar, O. K. . (2022). Cloud Host Selection using Iterative Particle-Swarm Optimization for Dynamic Container Consolidation. International Journal on Recent and Innovation Trends in Computing and Communication, 10(1s), 247–253. https://doi.org/10.17762/ijritcc.v10i1s.5846
Yedukondalu, G., Samunnisa, K., Bhavsingh, M., Raghuram, I. S., & Lavanya, A. (2022). MOCF: A multi-objective clustering framework using an improved particle swarm optimization algorithm. International Journal on Recent and Innovation Trends in Computing and Communication, 10(10), 143-154. doi:10.17762/ijritcc.v10i10.5743
M, B. M., M, S., & S, H. (2023). Blockchain-Based Crowd funding Platform. International Journal of Computer Engineering in Research Trends, 10(5), 40–47. https://doi.org/10.22362/ijcert.v10i5.46
Butt, U. A., Amin, R., Aldabbas, H., Mohan, S., Alouffi, B., & Ahmadian, A. (2023). Cloud-based email phishing attack using machine and deep learning algorithm. Complex & Intelligent Systems, 9(3), 3043-3070.
Cui, P., & Guin, U. (2019, July). Countering botnet of things using blockchain-based authenticity framework. In 2019 IEEE computer society annual symposium on VLSI (ISVLSI) (pp. 598-603). IEEE.
Mishra, A., Hsu, C. H., Arya, V., Chaurasia, P., & Li, P. (2021, September). A Hybrid Approach for Protection Against Rumours in a IoT Enabled Smart City Environment. In International Conference on Cyber Security, Privacy and Networking (pp. 101-109). Cham: Springer International Publishing.
Sujatha, G., Ayyannan, M., Priya, S. G., Arun, V., Arularasan, A. N., & Kumar, M. J. (2023, February). Hybrid Optimization Algorithm to Mitigate Phishing URL Attacks In Smart Cities. In 2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM) (pp. 1-5). IEEE.
Kumar, N., Goel, V., Ranjan, R., Altuwairiqi, M., Alyami, H., & Asakipaam, S. A. (2023). A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City. Security and Communication Networks, 2023.
Pasha, M. J., Pingili, M., Sreenivasulu, K., Bhavsingh, M., Saheb, S. I., & Saleh, A. (2022). Bug2 algorithm-based data fusion using mobile element for IoT-enabled wireless sensor networks. Measurement: Sensors, 24, 100548.
Prakash, P. S., Janardhan, M., Sreenivasulu, K., Saheb, S. I., Neeha, S., & Bhavsingh, M. (2022). Mixed Linear Programming for Charging Vehicle Scheduling in Large-Scale Rechargeable WSNs. Journal of Sensors, 2022.
Assegie, T. A. (2021). An optimized KNN model for signature-based malware detection. Tsehay Admassu Assegie." An Optimized KNN Model for Signature-Based Malware Detection". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN, 2349-7084.
Thorat, S. S., Ashwini, M., Kelshikar, A., Londhe, S., & Choudhary, M. (2017). IoT based smart parking system using rfid. International Journal of Computer Engineering In Research Trends, 4(1), 9-12.
Aldakheel, E. A., Zakariah, M., Gashgari, G. A., Almarshad, F. A., & Alzahrani, A. I. (2023). A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators. Sensors, 23(9), 4403.
Kumar, V. K. A., Kumar, M. R., Shribala, N., Singh, N., Gunjan, V. K., Siddiquee, K. N., & Arif, M. (2022). Dynamic Wavelength Scheduling by Multiobjectives in OBS Networks. In N. Jan (Ed.), Journal of Mathematics (Vol. 2022, pp. 1–10). Hindawi Limited. https://doi.org/10.1155/2022/3806018
Revathy, S. ., & Priya, S. S. . (2023). Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 156–160. https://doi.org/10.17762/ijritcc.v11i4s.6322
Kanna, D. ., & Muda, I. . (2021). Hybrid Stacked LSTM Based Classification in Prediction of Weather Forecasting Using Deep Learning. Research Journal of Computer Systems and Engineering, 2(1), 46:51. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/22
Kumar, S. A. S., Naveen, R., Dhabliya, D., Shankar, B. M., & Rajesh, B. N. (2020). Electronic currency note sterilizer machine. Paper presented at the Materials Today: Proceedings,37(Part 2) 1442-1444. doi:10.1016/j.matpr.2020.07.064 Retrieved from www.scopus.com
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.