Main Article Content

Abstract

Phishing attacks are still the main and most severe vulnerability to cyber security through deceptive URLs for sensitive user information. Therefore, this paper proposes a framework based on deep learning techniques for phishing and legitimate URLs as an alternative to the currently employed blacklist-based detection approaches that have proven rather limited. The architecture includes one custom Convolutional Neural Network (CNN) and three Transfer Learning Architectures, ResNet50, InceptionV3, and VGG16 using representations of features based on URLs. All models under consideration shall be trained with Adam Optimizer and Binary Cross-Entropy loss function so that a fair comparison can be made under unified experimental set-up conditions. The set is broken down as 70% training, 10% validation, and 20% testing. Experimental results provide clear evidence that transfer learning models perform much better than the baseline CNN. The InceptionV3 model posted a validation accuracy of 100% leading the pack, followed by VGG16 at 98.96%. ResNet50 could muster only 97.92%. The proposed CNN model has also achieved quite competitive performance with a validation accuracy above 97%. Therefore, these results are explicit in confirming the effectiveness, robustness, and generalization capability of deep learning architectures toward the problem of phishing URL detection. This proposed framework will go a long way in ensuring web security is beefed up as it creates a barrier against all evolving cyber threats.

Keywords

Phishing URL detection Deep learning Cybersecurity Convolutional neural networks Transfer learning

Article Details

How to Cite
[1]
Hind Abdulkareem Abdalrazaq, “A Robust Intelligent Approach for Phishing URL Detection Using Hybrid Machine Learning”, Cybersys. J, vol. 2, no. 2, pp. 91–97, Dec. 2025, doi: 10.57238/csj.2025.1017.

How to Cite

[1]
Hind Abdulkareem Abdalrazaq, “A Robust Intelligent Approach for Phishing URL Detection Using Hybrid Machine Learning”, Cybersys. J, vol. 2, no. 2, pp. 91–97, Dec. 2025, doi: 10.57238/csj.2025.1017.

References

  1. J. Kline, E. Oakes, and P. Barford, ‘‘A URL-based analysis of WWW structure and dynamics,’’ in Proc. Netw. Traffic Meas. Anal. Conf. (TMA), Jun. 2019, p.800.doi:https://doi.org/10.23919/TMA.2019.8784665
  2. P. Flach and M. Kull, ‘‘Precision-recall-gain curves: PR analysis done right,’’ in Proc. Adv. Neural Inf. Process. Syst., 2015, pp. 838–846.
  3. R. S. Rao and A. R. Pais, ‘‘Detection of phishing websites using an efficient feature-based machine learning framework,’’ Neural Comput. Appl., vol. 31, no. 8, pp. 3851–3873, Aug. 2019.doi:https://doi.org/ 10.17577/IJERTV9IS050888
  4. H. Shahriar and S. Nimmagadda, ‘‘Network intrusion detection for TCP/IP packets with machine learning techniques,’’ in Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Cham, Switzerland: Springer, 2020, pp. 231–247.doi: https://doi.org/10.1007/978-3-030-57024-8_10
  5. T. Nathezhtha, D. Sangeetha, and V. Vaidehi, ‘‘WC-PAD: Web crawling based phishing attack detection,’’ in Proc. Int. Carnahan Conf. Secur. Technol. (ICCST), Oct. 2019, pp. 1–6. (2020). Accessed:Jan.2020.doi:https://doi.org/10.1109/ccst.2019.8888416
  6. S. Bell and P. Komisarczuk, ‘‘An analysis of phishing blacklists: Google safe browsing, OpenPhish, and PhishTank,’’ in Proc. Australas. Comput. Sci. Week Multiconf. (ACSW), Melbourne, VIC, Australia. New York, NY, USA: Association for Computing Machinery, 2020, pp. 1–11, Art. no. 3, doi: https://doi.org/10.1145/3373017.3373020
  7. G. Diksha and J. A. Kumar, ‘‘Mobile phishing attacks and defence mechanisms: State of art and open research challenges,’’ Comput. Secur., vol. 73, pp. 519–544, Mar. 2018.doi: https://doi.org/10.1016/j.cose.2017.12.006
  8. V. Shahrivari, M. M. Darabi, and M. Izadi, ‘‘Phishing detection using machine learning techniques,’’ 2020, arXiv:2009.11116.doi: https://doi.org/10.52783/pst.1643
  9. S. Wang, S. Khan, C. Xu, S. Nazir, and A. Hafeez, ‘‘Deep learning-based efficient model development for phishing detection using random forest and BLSTM classifiers,’’ Complexity, vol. 2020, pp. 1–7, Sep.2020.doi: https://doi.org/10.1155/2020/8694796
  10. G. Sonowal and K. S. Kuppusamy, ‘‘PhiDMA—A phishing detection model with multi-filter approach,’’ J. King Saud Univ., Comput. Inf. Sci., vol. 32, no. 1, pp. 99–112, Jan. 2020.doi: https://doi.org/10.1016/j.jksuci.2017.07.005
  11. M. Babagoli, M. P. Aghababa, and V. Solouk, ‘‘Heuristic nonlinear regression strategy for detecting phishing websites,’’ Soft Comput., vol. 23, no. 12, pp. 4315-4327,Jun.2.doi: https://doi.org/10.1007/s00500-018-3084-2
  12. R. S. Rao and A. R. Pais, ‘‘Detection of phishing websites using an efficient feature-based machine learning framework,’’ Neural Comput. Appl., vol. 31, no. 8, pp. 3851–3873, Aug. 2019.doi: https://doi.org/10.1007/s00521-017-3305-0
  13. Y. Feng, Q. Wang, D. Wu, Z. Luo, X. Chen, T. Zhang, and W. Gao, ‘‘Machine learning aided phase field method for fracture mechanics,’’ Int. J. Eng. Sci., vol. 169, Dec. 2021, Art. no. 103587.doi: https://doi.org/10.1016/j.ijengsci.2021.103587
  14. A. Karim, M. Shahroz, K. Mustofa, S. B. Belhaouari and S. R. K. Joga, "Phishing Detection System Through Hybrid Machine Learning Based on URL," in IEEE Access, vol. 11, pp. 36805-36822, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3252366
  15. M. M. Yadollahi, F. Shoeleh, E. Serkani, A. Madani and H. Gharaee, "An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features," 2019 5th International Conference on Web Research (ICWR), Tehran, Iran, 2019, pp. 281-286, doi: https://doi.org/10.1109/ICWR.2019.8765265
  16. Y. Mourtaji, M. Bouhorma, D. Alghazzawi, G. Aldabbagh, and A. Alghamdi, “Hybrid rule-based solution for phishing URL detection using convolutional neural network,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 8241104,pp. 1–14, Sep. 2021, doi: https://doi.org/10.1155/2021/8241104
  17. S. Das Gupta, K. T. Shahriar, H. Alqahtani, “Modeling hybrid feature-based phishing websites detection using machine learning techniques,”Annals of Data Science, vol. 11, pp. 217–242, 2024,doi: https://doi.org/10.1007/s40745-022-00379-8
  18. M. W. Shaukat, R. Amin, M. M. A. Muslam, A. H. Alshehri and J. Xie, “A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning,” Sensors, vol. 23, no. 19, Art. no. 8070, 2023, doi: https://doi.org/10.3390/s23198070
  19. J. S. Tharani and N. A. G. Arachchilage, “Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach,” Security and Privacy, vol. 3, no. 5, e120, Jul. 2020, doi: https://doi.org/10.1002/spy2.120
  20. M. W. Shaukat, R. Amin, M. M. A. Muslam, A. H. Alshehri, and J. Xie, “A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning,” Sensors, vol. 23, no. 19, Art. no. 8070, 2023, doi: https://doi.org/10.3390/s23198070
  21. A. Almalaq, S. Albadran, and M. A. Mohamed, “Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems,” Mathematics, vol. 10, no. 15, Art. no. 2574, 2022, doi: https://doi.org/10.3390/math10152574
  22. S. Jalil, M. Usman, and A. Fong, “Highly accurate phishing URL detection based on machine learning,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, pp. 9233–9251, 2023, doi: https://doi.org/10.1007/s12652-022-04426-3
  23. O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,” Expert Systems with Applications, vol. 117, pp. 345–357, 2019, doi: https://doi.org/10.1016/j.eswa.2018.09.029
  24. A. Prasad and S. Chandra, "PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning," Computers & Security, vol. 136, Art. no. 103545, Jan. 2024, doi: https://doi.org/10.1016/j.cose.2023.103545.
  25. A. Rawla, S. Singh, M. Daniyal, and P. Dubey, "Detection of Phishing Attacks in PhiUSIIL Dataset using Deep Learning," Procedia Computer Science, vol. 259, pp. 543–552, 2025, doi: https://doi.org/10.1016/j.procs.2025.04.003
  26. V. Vajrobol, V. Vajratiya, B. B. Gupta, and A. Gaurav, "Mutual information based logistic regression for phishing URL detection," Cyber Security and Applications, vol. 2, Art. no. 100044, 2024, doi: https://doi.org/10.1016/j.csa.2024.100044
  27. A. Sumayli, "Development of advanced machine learning models for optimization of methyl ester biofuel production from papaya oil: Gaussian process regression (GPR), multilayer perceptron (MLP), and K-nearest neighbor (KNN) regression models," Arabian Journal of Chemistry, vol. 16, Art. no. 104833, Jul. 2023, doi: https://doi.org/10.1016/j.arabjc.2023.104833
  28. M. Grandini, E. Bagli, and G. Visani, "Metrics for Multi-Class Classification: an Overview," arXiv preprint arXiv:2008.05756, Aug. 2020.https://doi.org/10.48550/arXiv.2008.05756.
  29. J. Qi, J. Du, S. M. Siniscalchi, X. Ma, and C. H. Lee, “On Mean Absolute Error for Deep Neural Network Based Vector-to-Vector Regression,” IEEE Signal Processing Letters, vol. 27, no. c, pp. 1485–1489, 2020,doi:https://doi.org/10.1109/LSP.2020.3016837
  30. O. Rainio, J. Teuho, and R. Klén, "Evaluation metrics and statistical tests for machine learning," Scientific Reports, vol. 14, Art. no. 6086, 2024, doi: https://doi.org/10.1038/s41598-024-56706-x
  31. S. Subbiah, K. S. M. Anbananthen, S. Thangaraj, S. Kannan and D. Chelliah, "Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm," in Journal of Communications and Networks, vol. 24, no. 2, pp. 264-273, April 2022, doi: https://doi.org/10.23919/JCN.2022.000002
  32. G. Alfian, M. Syafrudin, I. Fahrurrozi, N. L. Fitriyani, F. T. D. Atmaji, T. Widodo, N. Bahiyah, F. Benes, and J. Rhee, "Predicting Breast Cancer from Risk Factors Using SVM and Extra-Trees-Based Feature Selection Method," Computers, vol. 11, no. 9, Art. no. 136, 2022, doi: https://doi.org/10.3390/computers11090136
  33. L. Alzubaidi, J. Zhang, A. J. Humaidi, et al., "Review of deep learning: concepts, CNN architectures, challenges, applications, future directions," Journal of Big Data, vol. 8, Art. no. 53, 2021, doi: https://doi.org/10.1186/s40537-021-00444-8
  34. R. Ribani and M. Marengoni, "A Survey of Transfer Learning for Convolutional Neural Networks," 2019 32nd SIBGRAPI Conference on Graphics, Patterns and Images Tutorials (SIBGRAPI-T), Rio de Janeiro, Brazil, 2019, pp. 47-57, doi:https://doi.org/10.48550/arXiv.2008.0575610.1109/SIBGRAPI-T.2019.00010
  35. A. Kaya, A. S. Keceli, C. Catal, H. Y. Yalic, H. Temucin, and B. Tekinerdogan, "Analysis of transfer learning for deep neural network based plant classification models," Computers and Electronics in Agriculture, vol. 158, pp. 20–29, Mar. 2019, doi: https://doi.org/10.1016/j.compag.2019.01.041
  36. A. Deshpande, V. V. Estrela, and P. Patavardhan, "The DCT-CNN-ResNet50 architecture to classify brain tumors with super-resolution, convolutional neural network, and the ResNet50," Neuroscience Informatics, vol. 1, no. 4, Art. no. 100013, Dec. 2021, doi: https://doi.org/10.1016/j.neuri.2021.100013.
  37. A. Minarno, L. Aripa, Y. Azhar, and Y. Munarko, "Classification of Malaria Cell Image using Inception-V3 Architecture," Journal of Informatics and Visualization, vol. 7, no. 2, 2023, doi: https://doi.org/10.30630/joiv.7.2.1301
  38. Z.-P. Jiang, Y.-Y. Liu, Z.-E. Shao, and K.-W. Huang, "An Improved VGG16 Model for Pneumonia Image Classification," Applied Sciences, vol. 11, no. 23, Art. no. 11185, 2021, doi: https://doi.org/10.3390/app112311185
  39. B. Kim, Y. Natarajan, S. D. Munisamy, A. Rajendran, K. R. S. Preethaa, D.-E. Lee, and G. Wadhwa, "Deep Learning Activation Layer-Based Wall Quality Recognition Using Conv2D ResNet Exponential Transfer Learning Model," Mathematics, vol. 10, no. 23, Art. no. 4602, 2022, doi: https://doi.org/10.3390/math10234602
  40. Y. Bai, "RELU-Function and Derived Function Review," SHS Web of Conferences, vol. 144, Art. no. 02006,2022,doi:https://doi.org/10.1051/shsconf/202214402006
  41. A. Zafar, M. Aamir, N. M. Nawi, A. Arshad, S. Riaz, A. Alruban, A. K. Dutta, and S. Almotairi, "A Comparison of Pooling Methods for Convolutional Neural Networks," Applied Sciences, vol. 12, no. 17, Art. no. 8643, 2022, doi: https://doi.org/10.3390/app12178643
  42. H. Pratiwi, A. P. Windarto, S. Susliansyah, R. R. Aria, S. Susilowati, L. K. Rahayu, Y. Fitriani, A. Merdekawati, and I. R. Rahadjeng, "Sigmoid Activation Function in Selecting the Best Model of Artificial Neural Networks," Journal of Physics: Conference Series, vol. 1471, Art. no. 012010, 2020, doi:https://doi.org/10.1088/17426596/1471/1/012010