Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

The proposed cacography-based architecture tuned transformer method prevents novel ransomware email phishing (REP) attacks. Cybercriminals now create ransomware email phishing attacks through deceptive emails and text messages. Existing email phishing attacks detection based on email headers, keywords, redirect web link attempts, scanning the email body text, Uniform Resource Locator, IP address, domain name, payload analysis, unusual behaviour, network traffic, and embedded links. Existing phishing models never classify the text based on the language packs, Short Message Service language, textiShort Message Service and cacography words. This paper proposes a Language Pack-based Tuned Transformer Language (LPTTL) framework for email body text analysis, which prevents REP attacks. LPTTL framework consists of cacography algorithms such as (i) Language Pack Tuned Bidirectional Encoder Representation Transformer (LPT-BERT), (ii) Text-Text Transfer Transformer (LPT-T5) algorithms for detecting REP attacks through tokenizing the words and embedded email body words. Next, the proposed classification algorithms are (i) Lyrebird Optimization Algorithm-Long Short-Term Memory (LOA-LSTM), (ii) Hippopotamus Optimization (HO)-Gated Recurrent Neural Network (HO-GRU) and (iii) Meerkat Optimization Algorithm-Bidirectional Long Short-Term Memory (MOA-BiLSTM) which are used for REP classification based on tokenized text. LPTTL framework has an accuracy of about 95.47%, precision of 96.8%, recall of 95.63% and F1-score of 96.21% compared to existing methods.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12215714PMC
http://dx.doi.org/10.1038/s41598-025-06530-8DOI Listing

Publication Analysis

Top Keywords

email phishing
16
ransomware email
12
tuned transformer
12
rep attacks
12
email body
12
lpttl framework
12
email
8
language pack
8
pack tuned
8
transformer language
8

Similar Publications

With the widespread adoption of internet technologies and email communication systems, the exponential growth in email usage has precipitated a corresponding surge in spam proliferation. These unsolicited messages not only consume users' valuable time through information overload but also pose significant cybersecurity threats through malware distribution and phishing schemes, thereby jeopardizing both digital security and user experience. This emerging challenge underscores the critical importance of developing effective spam detection mechanisms as a cornerstone of modern cybersecurity infrastructure.

View Article and Find Full Text PDF

ObjectiveTo examine how domain-switching and user characteristics may predict broad susceptibility to digital deception.BackgroundDespite successful automated filtering techniques, humans remain vulnerable to fraud, losing billions of dollars annually. Many scams are delivered by digitally mediated methods, such as phishing emails or fake social media accounts.

View Article and Find Full Text PDF

Phishing attacks account for a sizable number of data breaches and are costly to individuals and organizations. A burgeoning literature is developing on how individual differences predict people's susceptibility to phishing attacks. Within this literature, an intriguing idea has been proffered: People higher (vs.

View Article and Find Full Text PDF

The proposed cacography-based architecture tuned transformer method prevents novel ransomware email phishing (REP) attacks. Cybercriminals now create ransomware email phishing attacks through deceptive emails and text messages. Existing email phishing attacks detection based on email headers, keywords, redirect web link attempts, scanning the email body text, Uniform Resource Locator, IP address, domain name, payload analysis, unusual behaviour, network traffic, and embedded links.

View Article and Find Full Text PDF

A hybrid super learner ensemble for phishing detection on mobile devices.

Sci Rep

May 2025

Department of Information and Communication Engineering, Chosun University, Gwangju, 61452, Republic of Korea.

In today's digital age, the rapid increase in online users and massive network traffic has made ensuring security more challenging. Among the various cyber threats, phishing remains one of the most significant. Phishing is a cyberattack in which attackers steal sensitive information, such as usernames, passwords, and credit card details, through fake web pages designed to mimic legitimate websites.

View Article and Find Full Text PDF