<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">National Security and Strategic Planning</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">National Security and Strategic Planning</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Национальная безопасность и стратегическое планирование</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2307-1400</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">89512</article-id>
   <article-id pub-id-type="doi">10.37468/2307-1400-2024-2-13-24</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Информационная безопасность</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>Information Security</subject>
    </subj-group>
    <subj-group>
     <subject>Информационная безопасность</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">Using machine learning algorithms to recognize phishing resources</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Использование алгоритмов машинного обучения для распознавания фишинговых ресурсов</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Котиков</surname>
       <given-names>Никита Михайлович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Kotikov</surname>
       <given-names>Nikita M.</given-names>
      </name>
     </name-alternatives>
     <email>kotikov@mirea.ru</email>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-8788-4256</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Максимова</surname>
       <given-names>Елена Александровна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Maksimova</surname>
       <given-names>Elena A.</given-names>
      </name>
     </name-alternatives>
     <email>maksimova@mirea.ru</email>
     <bio xml:lang="ru">
      <p>доктор технических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>doctor of technical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Русаков</surname>
       <given-names>Алексей Михайлович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Rusakov</surname>
       <given-names>Alexey Mikhailovich</given-names>
      </name>
     </name-alternatives>
     <email>rusakov_a@mirea.ru</email>
     <xref ref-type="aff" rid="aff-3"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">МИРЭА-Российский технологический университет</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">MIREA-Russian Technological University</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">МИРЭА-Российский технологический университет</institution>
     <city>Москва</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">MIREA - Russian Technological University</institution>
     <city>Moscow</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-3">
    <aff>
     <institution xml:lang="ru">МИРЭА-Российский технологический университет</institution>
     <city>Москва</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">MIREA-Russian Technological University</institution>
     <city>Moscow</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2024-06-30T00:00:00+03:00">
    <day>30</day>
    <month>06</month>
    <year>2024</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2024-06-30T00:00:00+03:00">
    <day>30</day>
    <month>06</month>
    <year>2024</year>
   </pub-date>
   <volume>2024</volume>
   <issue>2</issue>
   <fpage>13</fpage>
   <lpage>24</lpage>
   <history>
    <date date-type="received" iso-8601-date="2024-03-16T00:00:00+03:00">
     <day>16</day>
     <month>03</month>
     <year>2024</year>
    </date>
    <date date-type="accepted" iso-8601-date="2024-06-23T00:00:00+03:00">
     <day>23</day>
     <month>06</month>
     <year>2024</year>
    </date>
   </history>
   <self-uri xlink:href="https://futurepubl.ru/en/nauka/article/89512/view">https://futurepubl.ru/en/nauka/article/89512/view</self-uri>
   <abstract xml:lang="ru">
    <p>Целью работы является исследование популярных методов машинного обучения, применяемых для обеспечения безопасности информационных систем и их пользователей от фишинга. В настоящей статье рассматриваются актуальные технологии злоумышленников для проведения атак с использованием методов социальной инженерии, меры защиты, позволяющие обеспечить безопасность корпоративных пользователей, а также классификация методов обнаружения нелегитимных интернет-ресурсов с использованием технологий машинного обучения. В качестве существующих алгоритмов машинного обучения, позволяющих производить идентификацию опасных ресурсов в статье представлены: теорема  Байеса, принцип классификатора, алгоритм k-ближайших соседей и логистическая регрессия, а также приведена статистическая информация в отношении частоты обнаружения популярных признаков фишинговых и зловредных ресурсов. По результатам исследования в статье обоснована необходимость использования комплексного подхода к обеспечению защиты инфраструктуры с учетом многовекторного анализа как достаточно востребованного как в теоретическом, таки в практическом плане.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The purpose of the work is to study popular machine learning methods used to ensure the security of information systems and their users from phishing. This article discusses the current technologies of intruders to carry out attacks using social engineering methods, security measures to ensure the security of corporate users, as well as the classification of methods for detecting illegitimate Internet resources using machine learning technologies. As existing machine learning algorithms that allow the identification of dangerous resources, the article presents: Bayes' theorem, the classifier principle, the k-nearest neighbor algorithm and logistic regression, as well as statistical information on the frequency of detection of popular signs of phishing and malicious resources. The article concludes that an integrated approach to ensuring infrastructure protection, taking into account a multi-vector analysis.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>классификация</kwd>
    <kwd>фишинг</kwd>
    <kwd>информационная безопасность</kwd>
    <kwd>машинное обучение</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>classification</kwd>
    <kwd>phishing</kwd>
    <kwd>information security</kwd>
    <kwd>machine learning</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Импортозамещение на рынке информационной безопасности [Электронный ресурс]. – Режим доступа: https://habr.com/ru/articles/676664/</mixed-citation>
     <mixed-citation xml:lang="en">Import substitution in the information security market [Electronic resource]. URL: https://habr.com/ru/articles/676664/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Угрозовая активность: как связаны хакерские атаки на сеть «Верный» и СДЭК [Электронный ресурс]. – Режим доступа: https://iz.ru/1706284/ivan-chernousov-valerii-kodachigov-evgeniia-pertceva/ugrozovaia-aktivnost-kak-sviazany-khakerskie-ataki-na-set-vernyi-i-sdek</mixed-citation>
     <mixed-citation xml:lang="en">Criminal activity: how are hacker attacks on the Verny network and SDEK related? [Electronic resource]. URL: https://iz.ru/1706284/ivan-chernousov-valerii-kodachigov-evgeniia-pertceva/ugrozovaia-aktivnost-kak-sviazany-khakerskie-ataki-na-set-vernyi-i-sdek</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Хакеры открывают сезон распродаж [Электронный ресурс]. – Режим доступа: https://www.kommersant.ru/doc/4548082</mixed-citation>
     <mixed-citation xml:lang="en">Hackers open the sales season [Electronic resource]. URL: https://www.kommersant.ru/doc/4548082</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Gophish – фреймворк для фишинга. Как писать фейковые письма и обманывать своих сотрудников [Электронный ресурс]. – Режим доступа: https://xakep.ru/2016/12/07/gophish-phishing-framework-howto/</mixed-citation>
     <mixed-citation xml:lang="en">Gophish is a phishing framework. How to write fake emails and deceive your employees [Electronic resource]. URL: https://xakep.ru/2016/12/07/gophish-phishing-framework-howto/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Сбербанк создал flash-игру для сотрудников после фишинговых «писем Грефа» [Электронный ресурс]. – Режим доступа: https://www.rbc.ru/technology_and_media/15/02/2017/58a430e69a79472ba6d0aаd?from=newsfeed</mixed-citation>
     <mixed-citation xml:lang="en">Sberbank has created a flash game for employees after phishing &quot;Gref letters&quot; [Electronic resource]. URL: https://www.rbc.ru/technology_and_media/15/02/2017/58a430e69a79472baa6d0ad?from=newsfeed/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Наивный алгоритм Байеса в машинном [Электронный ресурс]. – Режим доступа: https://www.guru99.com/ru/naive-bayes-classifiers.html</mixed-citation>
     <mixed-citation xml:lang="en">Naive Bayes algorithm in machine learning [Electronic resource]. URL: https://www.guru99.com/ru/naive-bayes-classifiers.html</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Метод k-ближайших соседей (k-nearest neighbour) [Электронный ресурс]. – Режим доступа: https://proglib.io/p/metod-k-blizhayshih-sosedey-k-nearest-neighbour-2021-07-19</mixed-citation>
     <mixed-citation xml:lang="en">The k-nearest neighbor method (k-nearest neighbour) [Electronic resource]. URL: https://proglib.io/p/metod-k-blizhayshih-sosedey-k-nearest-neighbour-2021-07-19</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Logistic Regression in Machine Learning [Электронный ресурс]. – Режим доступа: https://www.geeksforgeeks.org/understanding-logistic-regression/</mixed-citation>
     <mixed-citation xml:lang="en">Logistic Regression in Machine Learning [Electronic resource]. URL: https://www.geeksforgeeks.org/understanding-logistic-regression/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Punycode [Электронный ресурс]. – Режим доступа: https://ru.wikipedia.org/wiki/Punycode/</mixed-citation>
     <mixed-citation xml:lang="en">Punycode [Electronic resource]. URL: https://ru.wikipedia.org/wiki/Punycode/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Phishing with Unicode Domains [Электронный ресурс]. – Режим доступа: https://www.xudongz.com/blog/2017/idn-phishing/</mixed-citation>
     <mixed-citation xml:lang="en">Phishing with Unicode Domains [Electronic resource]. URL: https://www.xudongz.com/blog/2017/idn-phishing/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Rao R.S., Pais A.R. Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach // Journal of Ambient Intelligence and Humanized Computing. – 2020. – V. 11. – No. 9. – P. 3853-3872. DOI: https://doi.org/10.1007/s12652-019-01637-z</mixed-citation>
     <mixed-citation xml:lang="en">Rao R.S., Pais A.R. Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach // Journal of Ambient Intelligence and Humanized Computing. – 2020. – V. 11. – No. 9. – P. 3853-3872. DOI: https://doi.org/10.1007/s12652-019-01637-z</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Nagaraj K., Bhattacharjee B., Sridhar A., Sharvani G.S. Detection of phishing websites using a novel twofold ensemble model // Journal of Systems and Information Technology. – 2018. – V. 20. – No 3. – P. 321-357. DOI: https://doi.org/10.1108/JSIT-09-2017-0074</mixed-citation>
     <mixed-citation xml:lang="en">Nagaraj K., Bhattacharjee B., Sridhar A., Sharvani G.S. Detection of phishing websites using a novel twofold ensemble model // Journal of Systems and Information Technology. – 2018. – V. 20. – No 3. – P. 321-357. DOI: https://doi.org/10.1108/JSIT-09-2017-0074</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Sönmez Y., Tuncer T., Gökal H., Avci E. Phishing web sites features classification based on extreme learning machine // 2018 6th International Symposium on Digital Forensic and Security (ISDFS). – 2018. – P. 1-5. DOI: https://doi.org/10.1109/ISDFS.2018.8355342</mixed-citation>
     <mixed-citation xml:lang="en">Sönmez Y., Tuncer T., Gökal H., Avci E. Phishing web sites features classification based on extreme learning machine // 2018 6th International Symposium on Digital Forensic and Security (ISDFS). – 2018. – P. 1-5. DOI: https://doi.org/10.1109/ISDFS.2018.8355342</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Zamir A., Khan H.U., Iqbal T., Yousaf N., Aslam F., Anjum A., Hamdani M. Phishing web site detection using diverse machine learning algorithms // The Electronic Library. – 2020. – V. 38. – No 1. – С. 65-80. DOI: https://doi.org/10.1108/EL-05-2019-0118</mixed-citation>
     <mixed-citation xml:lang="en">Zamir A., Khan H.U., Iqbal T., Yousaf N., Aslam F., Anjum A., Hamdani M. Phishing web site detection using diverse machine learning algorithms // The Electronic Library. – 2020. – V. 38. – No 1. - P. 65-80. DOI: https://doi.org/10.1108/EL-05-2019-0118</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Sonowal G., Kuppusamy K.S. PhiDMA - A Phishing Detection Model with Multi-filter Approach // Journal of King Saud University-Computer and Information Sciences. – 2020. – V. 32. – No. 1. – P. 99-112. DOI: https://doi.org/10.1016/j.jksuci.2017.07.005</mixed-citation>
     <mixed-citation xml:lang="en">Sonowal G., Kuppusamy K.S. PhiDMA - A Phishing Detection Model with Multi-filter Approach // Journal of King Saud University-Computer and Information Sciences. – 2020. – V. 32. – No. 1. – P. 99-112. DOI: https://doi.org/10.1016/j.jksuci.2017.07.005</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Purwanto R., Paly A., Blair A., Jha S. PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites // 2020 IEEE Conference on Communications and Network Security (CNS). – IEEE, 2020. – P. 1-9. DOI: https://doi.org/10.1109/CNS48642.2020.9162211</mixed-citation>
     <mixed-citation xml:lang="en">Purwanto R., Paly A., Blair A., Jha S. PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites // 2020 IEEE Conference on Communications and Network Security (CNS). – IEEE, 2020. – P. 1-9. DOI: https://doi.org/10.1109/CNS48642.2020.9162211</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
