E-ISSN 2683-5961 | ISSN 2354-1814
 

Research Article

Online Publishing Date:
16 / 08 / 2023

 


Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment

Haruna Aminu Enefola, Alimi Olasunkanmi Maruf, Danlami Gabi.


Abstract
The majority of computing devices in the 21st century is deployed in the cloud, providing access to information and online services. However, phishing attacks continue to pose a risk to the confidentiality, integrity, and availability of information, exposing legitimate users to potential threats. Thus, despite previous efforts to combat phishing attacks and improve detection models, there is still room for further performance improvement. To address this issue, the study proposed a multi-level phishing attack detection scheme for the cloud environment. The experimental results via simulation show our proposed multi-level model for phishing detection can achieve 0.9997 each for accuracy and F1-measure, and 0.9998 for specificity and precision each, as well as 0.9996 and 0.0003 respectively. A comparison between the proposed approach and the benchmarked algorithm shows that the proposed approach performs significantly better. This indicates that the proposed model can be used by computing and application industries to prevent phishing attacks, and it demonstrates the effectiveness of integrating multiple models for research analysis and experimentation in the academic domain.

Key words: Precision, Cloud Computing, Accuracy, False Positive Rate, Recall


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Haruna Aminu Enefola
Articles by Alimi Olasunkanmi Maruf
Articles by Danlami Gabi
on Google
on Google Scholar

How to Cite this Article
Pubmed Style

Enefola HA, AOM, Gabi D. Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment. Equijost. 2022; 9(2): 5-11.


Web Style

Enefola HA, AOM, Gabi D. Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment. https://www.equijost.com/?mno=58558 [Access: March 05, 2024].


AMA (American Medical Association) Style

Enefola HA, AOM, Gabi D. Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment. Equijost. 2022; 9(2): 5-11.



Vancouver/ICMJE Style

Enefola HA, AOM, Gabi D. Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment. Equijost. (2022), [cited March 05, 2024]; 9(2): 5-11.



Harvard Style

Enefola, H. A., , . A. O. M. & Gabi, . D. (2022) Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment. Equijost, 9 (2), 5-11.



Turabian Style

Enefola, Haruna Aminu, Alimi Olasunkanmi Maruf, and Danlami Gabi. 2022. Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment. Equity Journal of Science and Technology, 9 (2), 5-11.



Chicago Style

Enefola, Haruna Aminu, Alimi Olasunkanmi Maruf, and Danlami Gabi. "Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment." Equity Journal of Science and Technology 9 (2022), 5-11.



MLA (The Modern Language Association) Style

Enefola, Haruna Aminu, Alimi Olasunkanmi Maruf, and Danlami Gabi. "Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment." Equity Journal of Science and Technology 9.2 (2022), 5-11. Print.



APA (American Psychological Association) Style

Enefola, H. A., , . A. O. M. & Gabi, . D. (2022) Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment. Equity Journal of Science and Technology, 9 (2), 5-11.





Most Viewed Articles
Most Accessed Articles

  • RESPONSE OF COWPEA VARIETIES TO BASAL STEM ROT (Sclerotium Rolfsii) DISEASE IN SOUTHERN GUINEA SAVANNA, NIGERIA
    M. U. Tanimu, I. U. Mohammed, A. Muhammad and N.M. Kwaifa
    Equijost. 2018; 5(1): 1-8
    » Abstract

  • PATTERN AND DETERMINANTS OF CONSUMERS DEMAND FOR CANNED FOOD IN ILORIN METROPOLIS OF KWARA STATE, NIGERIA
    Babatunde, R.O.; Amolegbe, K.B.; Akingbohungbe, I.T.
    Equijost. 2018; 5(1): 23-34
    » Abstract

  • PREDICTION OF CUSTOMER ACCESSIBILITY OF ELECTRONIC BANKING LOGISTIC REGRESSION IN NIGERIA
    Suleiman, S. and Usman, U.
    Equijost. 2016; 4(1): 93-97
    » Abstract

  • EFFECT OF LATE PLANTING ON INCIDENCE AND SEVERITY OF STENOCARPELLA EAR ROT OF MAIZE IN LAFIA, NASARAWA STATE, NIGERIA
    Garba Y. and Ogara I. M.
    Equijost. 2016; 4(1): 57-60
    » Abstract

  • EFFECTS OF DIFFERENT HORMONES ON THE GROWTH PERFORMANCE OF Clarias gariepinus
    ADESHINA, I., ADEWALE, Y. A. and DALHATU, B. J.
    Equijost. 2016; 4(1): 10-13
    » Abstract

  • Most Downloaded
    Top Downloaded Articles

  • ROLE OF FADAMA III PROGRAMME IN EMPOWERING THE SOCIO-ECONOMIC STATUS OF THE SOKOTO STATE PARTICIPATING WOMEN THROUGH CROP PRODUCTIVE ASSETS
    Ango, A. K.; Maikasuwa, M. A.; Sidi, M. H.
    Equijost. 2018; 5(1): 14-22
    » Abstract

  • ELECTROMAGNETIC CHARACTERIZATION AND FIELD DISTRIBUTION OF CO0.5ZN0.5FE2O4 USING PATCH MICROSTRIP ANTENNA AND FINITE ELEMENT METHODS
    Abubakar Yakubu, Zulkifli Abbas, Dago M Mohammad
    Equijost. 2018; 5(1): 123-131
    » Abstract

  • Bacteria Contamination of Market Vended Ponmo (Processed Cow Hide) in Birnin Kebbi, Kebbi State
    Jibrin Naka Keta, Mohammed Naka Keta, Mubarak Aminu Aburga, Grace Joseph Gudu
    Equijost. 2020; 7(1): 41-45
    » Abstract

  • RELATIONSHIP BETWEEN BODY WEIGHT AND ZOOMETRIC MEASUREMENTS IN SOME PURE AND CROSSBRED TURKEY POULTS
    Amao, O. J., Ayorinde, K. L. and Fayeye, T. R.
    Equijost. 2016; 4(1): 24-30
    » Abstract

  • PHYSICOCHEMICAL ANALYSES OF SESAME (Sesamun indicum L.) SEED OIL AND SOAP PRODUCED FROM THE OIL
    Hassan, A.; Wawata, I.G.
    Equijost. 2018; 5(1): 162-167
    » Abstract

  • Most Cited Articles
    Most Cited Articles