DEPHIDES Deep Learning Based Phishing Detection System
DEPHIDES Deep Learning Based Phishing Detection System
ABSTRACT In today’s digital landscape, the increasing prevalence of internet-connected devices, including
smartphones, personal computers, and IoT devices, has enabled users to perform a wide range of daily
activities such as shopping, banking, and communication in the online world. However, cybercriminals are
capitalizing on the Internet’s anonymity and the ease of conducting cyberattacks. Phishing attacks have
become a popular method for acquiring sensitive user information, including passwords, bank account
details, social security numbers and more, often through social engineering and messaging tools. To protect
users from such threats, it is essential to establish sophisticated phishing detection systems on computing
devices. Many of these systems leverage machine learning techniques for accurate classification. In recent
years, deep learning algorithms have gained prominence, especially when dealing with large datasets. This
study presents the development of a phishing detection system based on deep learning, employing five
different algorithms: artificial neural networks, convolutional neural networks, recurrent neural networks,
bidirectional recurrent neural networks, and attention networks. The system primarily focuses on the fast
classification of web pages using URLs. To assess the system’s performance, a relatively extensive dataset
of labeled URLs, comprising approximately five million records, was collected and shared. The experimental
results indicate that convolutional neural networks achieved the highest performance, boasting a detection
accuracy of 98.74% for phishing attacks. This research underscores the effectiveness of deep learning
algorithms, particularly in enhancing cybersecurity in the face of evolving cyber threats.
INDEX TERMS Deep learning, cyber security, phishing attack, classification algorithms, phishing detection.
weaknesses than other types of attacks. Because the main phishing web page with a legal appearance, and even people
elements needed for the initiation of the attack are based only who do not have technical knowledge can create a phishing
on the creation of content that the users will believe. web page very quickly. Therefore, this type of attack is quite
Due to their widespread use, phishing attacks are the focus simple and can be preferred even by novice users. Attackers
of many cyber security researchers and academic groups. can perform phishing attacks either by targeting large masses
The Anti-Phishing Working Group (APWG) [1] has had a of users or by targeting a specific user segment.
major impact on the research of phishing attacks, and they As a result of these properties, there are a growing number
emphasize that most of the phishing attacks target the victim of phishing attacks all over the world. Phishing attacks target
to gather their sensitive information by acting as if they were the weakest part of the security chain, end users. Volkamer et.
legal sites to get sensitive information. al. [3] emphasize that computer users may fall into phishing
According to the APWG Phishing Activity Trends Report due to the following reasons:
in the second quarter of 2022, the Unique Phishing attack
• Limited knowledge about the URLs and their structure,
were increased by almost 43% in 12 months and the
• Not knowing about trustable web pages,
most targeted industry sectors by phishing attacks were
• Due to the use of hidden URLs and redirections, original
financial institutions, SAAS/Webmail, social media, and
website address/URL can be hidden from the users and
payments [1]. Additionally, according to Cloudflare’s 2023
not displayed in the message,
Phishing Threats Report these attackers mainly use different
• Due to the workload of the users, they omit to consult
tactics whose distribution is shared in Fig. 1, in which the
the web pages/URLs, or they can accidentally enter to
most popular one is use of Deceptive Links (URL Addresses)
them,
[2].
• Users don’t know anything about phishing and cannot
distinguish legitimate web pages from phishing ones.
Phishing attacks are a type of cyber-attack based on
exploiting the weaknesses of computer users. For this rea-
son, a two-layer security mechanism should be considered to
prevent this attack. The first of these layers includes steps
to increase user awareness. It should be ensured that the
awareness of the users is always high by using factors such as
repeated training and warnings. To prevent phishing attacks,
the other security layer includes the development of the nec-
essary software to detect and prevent these attacks before they
reach the end user.
There are several developed approaches to detection of
phishing web pages such as machine learning based trained
systems, list-based system which use blacklists/whitelists,
image-based systems that take care of visual similarities and
third party-based systems which are connected to DNS or
whois based web services.
FIGURE 1. Phishing statistics in the second quarter of 2022. On the other side, in the literature, it is easily seen that
there is a growing tendency towards the use of machine
Apart from other cyber-attacks, phishing aims to steal learning-based solutions due to their dynamicity and adapt-
identities by exploiting the vulnerabilities of computer users. ability to new attack types. At the same time, in recent years,
Even though many security products have been put in place a specific learning mechanism, named deep learning, has
to keep the network infrastructure safe and the systems are emerged, and it is especially useful for training big data
always being watched, companies can lose a lot of money if systems or systems that do not have some defined features
a user accidentally shares sensitive information. and the tendency has shifted to deep learning mechanisms
Phishing attacks are based on referring the user to a web in recent years [4], [5]. In this paper, we aim to implement
page that looks legal. These web pages seem to belong to a a real-time detection of phishing web pages by investigat-
real company or web application. This information is stolen ing their URL addresses by using a deep learning (DL)
by the attacker when the user enters the credentials in the form based trained system. The developed DL model exhibits a
on this page. An attacker can use a variety of methods to direct notable capability to identify previously unrecognized phish-
users to the web page they want. The most common way is ing attacks. This encompasses scenarios where phishing
to send an email to the user and direct them to the malicious threats have not been shared with any external source before-
web page with the link in the message. Fig. 2 shows what a hand. Notably, even in instances where users initiate requests
phishing email looks like and what it looks like on the web. to URLs classified as phishing, the model enables preemp-
Currently, several sophisticated tools can be used to create a tive measures by blocking access to these URLs, thereby
preventing potential attacks. This proactive approach ensures • Utilization of Large-Scale Data Analysis for Training:
that a significant proportion of zero-day phishing attacks can The incorporation of huge size data analysis in train-
be effectively detected and blocked. The proposed work does ing the system with a vast dataset signifies a robust
not employ third-party solutions, including Whois Data, Web approach. This utilization of extensive datasets enhances
of Trust, Google Safe Browsing, and URL/IP Blacklists. This the system’s learning and adaptability.
intentional exclusion facilitated faster detections, emphasiz- • Language-Independent Detection Process: The paper
ing a self-contained and independent approach in the study’s introduces a language-independent detection process,
methodology. The results obtained from traditional machine underlining the versatility of the proposed system across
learning methods were analyzed in this article and the results different languages. This adaptability is crucial for
were compared. The experimental and comparative results addressing the diverse nature of phishing attacks.
showed that the proposed solution gives incredibly attractive The rest of the paper is organized as follows: related works
results especially compared with the standard machine learn- about phishing detection are detailed in Section II. Section III
ing based methods. The major contributions of the paper are: focuses on background knowledge about the methods and
• Construction of a Well-Balanced Large Dataset: The tools. The details of the proposed system are depicted in
creation of a sizable dataset with a balanced class dis- Section IV. The experimental results and discussions are
tribution stands out as a substantial and challenging presented in Section V and Section VI respectively. Finally,
achievement, particularly when compared with existing conclusions and future works about the research are pre-
datasets. sented.
• Enhanced Phishing Detection with Reduced False Posi-
tives: The paper demonstrates improved phishing detec- II. RELATED WORK
tion capabilities, showing a reduced false positive rate. Phishing attacks are based on taking advantage of people’s
This refinement is crucial for enhancing the reliability weaknesses. Therefore, the first step to ensuring security
of the detection system. against phishing attacks is to raise awareness of the users
• Fast Phishing Page Detection via URL Analysis: The and to keep their awareness high. Through simulations of
ability to rapidly detect phishing pages by analyzing the sample scenarios, it is necessary to assess the awareness
URL addresses represents a significant advancement. levels of the users at regular intervals and repeat the training.
This quick analysis adds a layer of efficiency to the Users, even experienced ones, can fall victim to this type of
phishing detection process. attack. Although security training decreases the number of
• Highly Accurate Detection of ‘‘Zero-Day Attacks’’: The deceived users, software-based detection systems, which can
paper introduces a method for accurately identifying be categorized mainly into five groups as depicted in Fig. 3,
‘‘Zero-Day Attacks,’’ contributing to an increased level can also warn the user about suspicious web pages. List Based
of security. This capability is pivotal for staying ahead of Detection Systems
emerging threats by distinguishing between normal and List-based phishing detection systems are the ones that can
abnormal requests. be easy to set up and maintain. They mainly use two lists as
• Independence from Third-Party Services: The proposed blacklists and whitelists for classifying URL addresses and/or
system operates independently of third-party services, IP addresses. These addresses can be classified either through
reducing reliance on external sources and enhancing the voting or by using experienced human classifiers who receive
self-sufficiency of the detection mechanism. computerized support for their decision.
C. THIRD PARTY BASED DETECTION SYSTEMS deployed in their lab, they randomly selected 600,000 URLs,
Due to its simplicity and ability to reach an acceptable accu- 400,000 benign and 200,000 malicious in their dataset. How-
racy rate, some authors developed their system by getting help ever, there are no details about the dataset, and they are also
from third-party services such as search engines/rankings or not shared publicly.
searching the whois/DNS records of the web page [17], [18], Some of the authors concentrated on IoT device security
[19]. With these systems, they can check the legitimacy of by blocking phishing URLs [25]. They used an autoencoder
the webpage and the authenticity of IP addresses and their mechanism to increase the performance of the proposed sys-
associated domain names. tems. They also tested different optimizers and said that the
However, the false positive rate of these methods is rel- Adam optimizer gave the best results for this application area.
atively high because if a legitimate web page is newly Some studies have tried to obtain more successful models
constructed, it does not appear in the search results or returned by combining different deep learning architectures. In [26],
values, which have a negative effect on this detection process. they proposed a customized model consisting of CNN and
Additionally, a legitimate domain name can host phishing LSTM layers. 3 different feature sets are used in this study.
web pages on its host, which is hard to catch for this type These are lexical features, character-level emphases, and
of system. word embeddings. Different models were built on these fea-
ture sets, and the outputs of these models were combined into
D. MACHINE LEARNING BASED DETECTION SYSTEMS one model. Lexical features are obtained because of feature
In recent years, there has been an increasing trend in the use of engineering. 30 different hand-crafted lexical features are
machine learning (ML) techniques, especially for solving lots used. A balanced dataset was used in the study. The total size
of real-world problems. These techniques train the system of the dataset is approximately 2.5 million.
with the help of a classification algorithm that uses a few A phishing URL detection system based on the RNN
features, like the page content, URL, and/or network features, architecture was developed in [27] and tests were done using
to tell the difference between a legitimate website and a only URL information. There are no manually created fea-
phishing website. tures. The feature that distinguishes this study from others
In [20], Karim et al. proposed a hybrid model to improve is its ability to visualize the effects of the URL sections on
the accuracies of the machine learning models. The combina- the outcome. Thanks to the visualization they’ve developed,
tion of linear regression (LR), support vector classifier (SVC) which fields in the URL cause phishing characters can be
and decision tree (DT) is created using soft and hard voting understood by the human eye. LSTM, GRU, BiLSTM, and
methods and named as (LR + SVC + DT). BiGRU were tested in the study and achieved 0.99 accuracy
Prabakaran et al. proposed an enhanced Deep Learning- on the 1.5M dataset.
based phishing detection approach that combines the There is no widely used dataset accepted in the literature
strengths of Variational Autoencoders (VAE) and Deep yet. Some of the researchers collect their datasets from open-
Neural Networks (DNN) to effectively identify malicious source sources, and some of them use the data collected in
URLs [21]. In [22], Alshingiti et al. proposed three different earlier studies. In [28], the authors created a dataset that they
techniques including LSTM, CNN and an LSTM–CNN- collected and performed training and test operations on this
based approach to identify phishing websites. They got the dataset. In addition, they made comparisons using 3 different
accuracies of the suggested techniques, i.e., 99.2%, 97.6%, public datasets in previously published studies in literature.
and 96.8% for CNN, LSTM–CNN, and LSTM, respectively. In the study, which was made with the CNN architecture, both
In the study [23], the authors proposed a URL-based phish- traditional machine learning methods and many deep learning
ing detection system by analyzing the login URLs. As a methods were tested and compared.
discriminative property, they focused on homepages with They proposed an approach in [29] that combines CNN
login forms by emphasizing that the current systems have a and attention based hierarchical RNN architecture. An unbal-
high positive rate when tested with the legitimate login pages. anced dataset was collected and used within the scope of the
They detected a total of six distinct phishing web domains, study. 4.5M legitimate samples and 241K phishing samples
and their findings were contingent on the kind of service used were used. In this study, an accuracy value of 0.97 was
by the attacker. Automatic feature extraction based on ‘‘Term obtained.
Frequency Inverse Document Frequency’’ at the character In [30], a phishing URL detection system was developed
N-gram level paired with the Logistic Regression algorithm using machine learning techniques. In this study, hand-crafted
was one of their methods of choice in the implementation and was used. A dataset of 73,575 URLs with a balanced class dis-
they achieved valuable results. tribution is used with 0.978 accuracy. A CNN-based approach
The used datasets are generally imbalanced due to the large is suggested in the study [31]. The study developed in [32]
number of legitimate web pages. Therefore, He et al. [24] can be used as a real-time system and can be improved
focused on the detection of phishing attacks by using the according to user feedback. A system working in real-time
cost sensitive XGBoost method. To balance the dataset, they has been developed with a Chrome extension. In this study,
preferred the use of the synthetic minority over-sampling besides traditional machine learning approaches, RNN-based
technique (SMOTE) for oversampling. By using a crawler GRU and LSTM approaches were tested. The accuracy rate
of this study was 0.99. The dataset used in this study was A. URL ADDRESSES
collected from open sources. The authors aimed to utilize The address of a web page is named as Uniform Resource
features for developing a phishing detection system and Locator (URL), which uses mainly the HTTP or HTTPS
designing an automated, complete, real-time system. A sys- protocol. A URL is essential for specifying the location of
tem working in real-time has been developed with a Chrome any type of resource, such as an HTML page, file, image,
extension. In this study, besides traditional machine learning directory, program, etc. The URL components, as depicted in
approaches, RNN-based GRU and LSTM approaches were Fig. 4, play a critical role in understanding the used method-
tested. The accuracy rate of this study was 0.99. The dataset ology.
used in this study was collected from open sources. On the
other hand, [33] aims to utilize features for developing a
phishing detection system and designing an automated, com-
plete, real-time system. Pre-processing, clustering, feature
selection, classification, and k-fold cross validation were
applied in the study. This study uses web page informa- FIGURE 4. URL components.
tion, not only URL information, to enhance the accuracy
rate. A dataset consisting of 500 web page records in total A URL may contain some or all of the following compo-
was used in the study and 0.963 accuracy was achieved. nents.
Reference [34] proposes a data-driven approach to detect
• A hostname consists of three parts: A domain name is
phishing websites using various machine learning classifiers,
such as Decision Tree, XGBoost, Random Forest, Support always present in the URL, and it is used for locating the
Vector Machine, and Naive Bayes by implementing vari- computer on the Internet. It is a registered identification
ous numbers/types of features such as URL-based features, ‘‘string’’ and is used instead of numeric IP addresses.
• A top-level domain is also always present in the URL.
hyperlink-based features, and hybrid features. They devel-
oped a dataset with 6000 URLs containing 3000 legitimate It shows the shortened form of an organization type as
URLs and 3000 phishing URLs. They collect web page infor- ‘‘.com’’, ‘‘.org’’, ‘‘.net’’ etc. in the hierarchical structure
mation with a crawler and apply feature extraction to the data of the Domain Name System (DNS). A subdomain is a
collected. Experimental results on the dataset show that the part of a larger domain that has a specific interest area
XGBoost algorithm with hybrid features has a 98.81% true and services.
• The protocol is always present, but not always visible
positive rate and 0.49% false-positive rate.
The spread of phishing attacks over email is quite com- in the URL and it determines how data is transferred
mon. It is also possible to detect phishing via email content. between the server and client side, mainly HTTP and
In [29] and [30] the authors developed a study that detects HTTPS; additionally, SMTP, FTP, DHCP, etc.
• Path/File shows where the page or file is on the website.
phishing attacks using email content. It is a confusing system
to adapt to the real world because e-mail is mostly considered The notation of the path/file depends on how the website
confidential. The study developed in the former one achieved is set up.
• HTML anchors or fragments are used on the webpage to
0.98 accuracy with the dataset consisting of 10K samples.
In [36], only traditional machine learning algorithms were show the internal page navigation.
evaluated while [35] focused on machine learning meth- Parameters are located at the end of the URL; they are
ods and deep learning-based CNN and RNN architectures. represented with key/value pairs, which use ‘?’ and ‘&’ char-
Preprocessing, clustering, feature selection, classification, acters respectively.
and k-fold cross validation were applied in the study. This
study uses web page information, not only URL information, B. DEEP LEARNING
to enhance the accuracy rate. A dataset consisting of 500 web While the capability of computers has increased, Artificial
page records in total was used in the study and 0.963 accu- Intelligence (AI) has become an expanding concern in com-
racy was achieved. The detailed comparison of the literature puter science due to its aim of making computers intelligent
on machine learning/deep learning-based phishing detection like humans. Learning is perhaps the distinguishing factor
systems is shown in Table 1. In this research, it is aimed to use that makes us human.
deep learning-based solutions with the dataset that is known Therefore, researchers focused on how to program this
as the greatest up to now. factor for computers, and a new subfield of AI emerged as
machine learning (ML). An ML algorithm enables forecast-
III. BACKGROUND ing future things without rules and models, building models
The proposed framework processes the URL address of the to explain the execution styles of real-world entities, and
web page and classifies them either as phishing or legitimate identifying patterns according to observed data.
by using a deep learning-based approach. Deep learning is one of the algorithms or subsets of
A background knowledge is required to understand the rest machine learning. It primarily refers to deep artificial neural
of the article clearly. These are explained in this section. networks or deep reinforcement learning, both of which use
the term ‘‘deep’’ to refer to the number of layers in the sys- from ‘‘commoncrawl.org’’, in the dataset created. PhishTank
tem [37]. There are different methods (such as convolutional is an open-source community where phishing URLs are
neural networks, recurrent neural networks, long short-term shared and kept up to date. Shared URLs are subject to a
memory, and auto-encoders) to apply DL, and these methods vote. A URL submitted because of voting is assigned to one
depend on the use cases, such as the kind of data that needs of three classes. These classes are Valid Phish, Invalid Phish,
to be processed. and Unknown. A URL is marked as valid phishing if enough
One of the main differences and applicability of DL and votes are collected to show that it is phishing. Otherwise,
ML is their data dependencies. ML algorithms are preferable it is assigned to the invalid phishing class if enough votes
and result in well even if there is a small dataset. However, are collected showing that the URL is not phishing. URLs
DL is a ‘‘Data Hungry’’ approach, and if you have more data, that cannot be identified as valid or invalid are marked as
you will get more accurate results. Due to its structure and unknown. This control mechanism ensures high accuracy of
depth, DL needs more computation. However, with the emer- collected phishing URLs. URLs in the Valid Phish class,
gence of new computation technologies such as the graphical which were shared by PhishTank until August 2018, were
processing unit (GPU), parallel computation is possible with collected. In this way, 2,320,893 phishing URLs are included
the use of thousands of cores compared to a single CPU, in the dataset created in this article. An example of the dataset
which has a small number of cores. is shown in Table 2.
Although DL methods generally use the power of parallel To develop a machine learning application for the detection
computation, the extended use of big data results in increased of phishing attacks, it is also necessary to collect URLs
training time, which ranges from hours to weeks to months. that are not phishing. We got help from the Common Crawl
However, traditional ML algorithms often train fast, which corpus which contains petabytes of data collected over the last
ranges from a few minutes to hours. 7 years. It contains raw web page data, extracted metadata,
and text extractions. The concept that well-known legitimate
IV. DEEP LEARNING BASED PHISHING DETECTION domains receiving a considerable number of backlinks tend
SYSTEM (DEPHIDES) DETAILS to have high rankings is a valid observation. It’s challenging
In the proposed model we made a data mining process accord- for a domain to rank prominently in search engine results
ing to the flowchart in Fig. 5. Initially we collected a relatively if it is being used for malicious purposes, as search engines
big dataset from Internet sources. aim to provide users with the most relevant and trustworthy
The dataset is divided into three parts for making a com- content. Therefore, the inclusion of such domains in the
parable performance measurement. 70 % is used for training, legitimate URL dataset ensures the reliability of the data
while 20 % is for validation and 10 % is used for testing. collected.
By using this flowchart, the system is trained for five dif- To compile the legitimate URL dataset, the first 100,000
ferent deep learning algorithms as Artificial Neural Network, domains from PageRank rankings worldwide, calculated by
Convolutional Neural Networks, Recurrent Neural Networks, Common Crawl using data from web crawling, were uti-
Bidirectional Recurrent Neural Networks, Attention Net- lized. For each of these domains, approximately 30 random
works. Finally, the trained model can be used in real world URLs were selected, resulting in a collection of 2,881,948
implementation for detection of phishing web pages. legitimate URLs. This extensive dataset provides a robust
foundation for the development and testing of phishing detec-
A. DATASET COLLECTION tion systems, as it represents a wide array of legitimate online
Within the scope of this study, a comprehensive dataset resources.
has been created and several experiments have been The developed phishing detection system adopts an
run on this dataset. Phishing URLs are collected from approach that involves collecting URLs from domains that are
‘‘www.phishtank.com’’, and legitimate URLs are collected unquestionably legal. Typically, the URL structure within a
domain remains consistent and standard. However, to ensure legitimate URLs. The other version (big_dataset) includes
that the algorithm does not become overly specialized or the whole dataset as given in Table 3. Due to hardware
memorize the specific structure of a particular domain, only constraints, most of the tests in this article were run on
10 or fewer URLs from such domains have been added a small_dataset to compare the results obtained by other
to the dataset. This approach helps maintain a broader and researchers doing research in this area.
more generalizable training dataset, allowing the system to
effectively detect phishing attempts across various legitimate B. VECTORIZATION
domains and their respective URL structures. Attackers employ various tactics in phishing attacks, some of
which pose significant challenges for detection. The attackers
TABLE 3. Dataset details. employ techniques that pose significant challenges for con-
ducting word-based analyses. This is due to the widespread
use of subtle alterations that are hard for individuals to dis-
cern. To perform word-based analysis, one must undergo
training on a corpus forming a substantial volume of nonsen-
sical words. Furthermore, word-based analysis introduces a
level of language dependence. Consequently, in this article,
we employed a character-based embedding approach for the
vectorization process. Since the embedding size for each char
is determined as 50, the vectorized version of the dataset is as
shown in Fig. 6.
more than 95% of the dataset. Consequently, this specific employed for training the model consists of sequential data,
value is adopted in the vectorization process. URLs exceed- therefore the proposed model necessities the use of an
ing 200 characters are truncated to this length, while URLs algorithm, which is capable of processing such sequences.
shorter than 200 characters are padded to reach 200-character In addressing the phishing URL detection challenge, the
length. In Fig. 7, a histogram chart is presented, depicting the approach involves treating the URL as a single entity and
URL length distribution in the ‘‘big_dataset.’’ The histogram learning the relationships among its smaller sub-parts.This
is generated by grouping URL lengths into 20-character buck- approach is widely used to make sense of textual data. For
ets. example, studies that perform semantic analysis have sim-
ilarly been able to achieve good success by evaluating the
sub-parts of the text together. In addition, it was thought that
it would be effective to use the most commonly preferred
algorithms for similar problems in literature. Due to the
high complexity of certain algorithms, training them becomes
a challenging task. Recognizing the critical importance of
faster response in detecting cyber-attacks, there is a deliberate
effort to avoid favoring algorithms with high complexity.
A total of five distinct deep learning architectures were exam-
ined. Furthermore, analyses were conducted to enhance the
accuracy rates by exploring various configurations for each
architecture.
Artificial Neural Network (ANN) is characterized by its
acyclic connections between units. In this approach, the archi-
FIGURE 7. Histogram of the URL length ranges.
tecture primarily includes dense layers. Each node performs a
direct linear calculation, and the parameters are then updated
In our dataset, a consistent dimension is imposed during the based on the output of the loss function.
training process, irrespective of the original sizes of URLs. Convolutional Neural Networks (CNNs) belong to the
URLs shorter than the specified length are padded to reach the realm of deep learning algorithms and are tailored to demand
designated dimension, while those exceeding the specified minimal preprocessing. They employ a form of multilayer
length are truncated to fit. This URL length parameter is perceptron and execute convolution operations by envision-
applied uniformly to all records in the dataset. Selecting ing them as sliding window functions applied to a matrix.
the best URL length entails striking a balance between the When it comes to word-based approaches, this window tra-
model’s architectural complexity and its coverage. If the verses through words in the input data. Each convolutional
URL length is excessively long, it substantially prolongs operation yields a response when it detects specific pat-
both training and testing times, thus diminishing the model’s terns. These patterns may encompass expressions such as
practicality and efficiency. Conversely, an overly short URL ‘‘I hate’’ or ‘‘very good,’’ enabling CNNs to identify them
length compromises the model’s training performance. As a within a sentence irrespective of their position. Character-
result, for this study, a URL length of 200 was chosen, as it is based approaches are instrumental in recognizing malicious
deemed well-suited for effectively representing the majority patterns in URLs used in phishing attacks. In Section III-B,
of the dataset. we delved into the challenges associated with identifying
Attackers may attempt to bypass prevention systems by phishing attacks.
utilizing URL shorteners. Even if the DEPHIDES URL Recurrent Neural Network (RNN) constitutes another
checking service fails to successfully classify the short- subset of deep learning techniques, where connections
ened URLs, the attackers’ objectives cannot still be reached between nodes create a directed graph along a sequence. RNN
because the shortened URLs are directed to original web can be envisioned as a sequence of interconnected neural
pages during the attack, and they will be accurately classified network blocks, forming a chain-like structure. It can be
as phishing by the system. likened to multiple replicas of the same network, each passing
information to its successor. This architecture is particularly
C. OVERVIEW OF TESTED ALGORITHMS well-suited for handling sequential data, such as text.
This article presents the development of a phishing URL In the RNN framework, when processing a word, it uses the
detection system based on deep learning. The dataset knowledge of preceding words. Each word takes the output
VOLUME 12, 2024 8061
O. K. Sahingoz et al.: DEPHIDES: Deep Learning Based Phishing Detection System
of the previous words as its input. RNN allows for one-way utilized in subsequent steps. These networks pinpoint and
information flow, while Bidirectional Recurrent Neural Net- select the important or distinctive elements of the data.
works (BRNN) facilitate two-way information exchange. This means that neural networks make informed decisions
This means that not only is information from preceding words regarding which features deserve their attention, thus assign-
used in processing a word, but the subsequent words are also ing more weight to essential elements across the entire
taken into account during the process. dataset.
Bidirectional Recurrent Neural Network (BRNN) Many deep learning approaches eliminate the need for
architecture operates on the principle of splitting the neurons the feature engineering step. Basic keyword searches are a
found in a regular RNN into two directions: one for the method that can be easily avoided. For instance, instead of
positive direction and another for the negative direction. Tra- using amazonsecurelogin.com, a similar domain like ama-
ditional RNNs have unidirectional information flow, meaning zonserucelogn.com could be employed for attacks. Since
they only consider information from preceding words when the words ‘‘secure’’ and ‘‘login’’ are not used directly
processing a word. However, for comprehensive word inter- in this example, keyword checking may not be success-
pretation, it’s often necessary to incorporate both preceding ful. Furthermore, attackers can not only target English but
and subsequent words. BRNN accomplishes this by running also launch regional attacks by creating URLs based on
one RNN in a forward direction from the beginning and the language of that region. This approach will impose
another in reverse from the end. additional tasks on keyword checking systems, such as
In contrast, Attention Networks (ATTs) employ an gathering, using, and updating an extensive word cloud
approach that prioritizes comprehending the entire context covering multiple languages. Having a specific phishing
rather than focusing on isolated components. ‘‘Attention’’ keyword may not always provide useful information for
in this context refers to the conscious directing of the classifying the URL as phishing. For instance, a URL like
mind toward a specific object or aspect. Attention net- amazon.com/customerservices/login may legitimately serve
works discern critical portions of the data and incorporate a legal purpose. Although deep learning algorithms have
this information into their memory, which is subsequently shown success in making such inferences.
URL hijacking, also known as URL redirection or URL At the stage of creating architecture, parameters such as
spoofing, is a type of cyber-attack where an attacker redirects the number of layers and number of neurons are given. The
a website’s traffic from a legitimate URL to a malicious one. default values of the frameworks used in other hyperparame-
However, the proposed system cannot detect URL hijacking ters are used.
attacks due to its structure. This article investigated the performance of five distinct
It is not necessary to retrain the entire dataset when incor- deep learning architectures: ANNs, CNNs, RNNs, BRNNs,
porating new data. The model can be updated iteratively, and ATTs. These architectures exhibit varying memory and
continuing from where it left off in the previous training. processing power requirements. Some may demand less
In this article, in addition to deep learning-based memory while others consume more, and the same principle
approaches, tests were conducted with traditional machine applies to processing power required during training.
learning algorithms and the results were compared. To ensure optimal GPU utilization and an equal accelerator
• Random Forest (Ensemble Based Algorithm) effect across all architectures, the batch size parameter was
• Naïve Bayes (Statistics Based Algorithm) fine-tuned in the tests. In cases where processing the entire
• Logistic Regression (Statistics Based Algorithm dataset at once posed a challenge, the dataset was divided into
smaller portions, each of which was processed sequentially.
Architectural components were used in the Keras tool.
It’s important to note that larger batch sizes consume more
A custom architectural design was made for each scenario
power and memory. In the tests conducted as part of this
using architectural components. Table 5 provides summaries
study, adjustments were made to the batch size parameter to
of the designed architectures. The detailed architectures of
maximize GPU utilization for all test scenarios. Importantly,
all scenarios can be accessed by clicking on the link given in
altering batch size values did not have a discernible impact on
each row at the table.
the accuracy and loss values. Instead, this parameter primarily
affects the volume of data processed within a given time-
V. EXPERIMENTAL RESULTS frame, without influencing the overall quality of the results.
In the context of this study, a deep learning-based system was
developed for the purpose of detecting URLs used in phishing A. DEEP LEARNING APPROACHED WITH BASE SCENARIO
attacks. The effectiveness of this system was assessed by
To facilitate a comprehensive comparison of running times
comparing its performance with traditional machine learning
and architectural performance, all five architectures under-
algorithms through a series of tests. In the implementation of
went testing with a common configuration featuring a single
deep learning architectures, the Keras Framework was used
layer of 128 neurons. This configuration served as the base-
in the front end, with the backend powered by the Tensor-
line, and subsequent performance-enhancing techniques were
flow Framework. Traditional machine learning algorithms
applied to enhance overall success. The tests for this configu-
were implemented and tested using the Scikit-Learn package,
ration spanned 20 epochs, and the results are visually depicted
which was also used for reporting test results.
in Fig. 8, and batch size, train accuracy, validation accuracy
The evaluation of the system’s performance entailed the
and test accuracy values are shown in Table 6.
use of several key metrics, including accuracy, loss, precision,
recall, and F-score. A detailed explanation of these metrics
TABLE 6. Performance metrics for base scenario with 20 epochs.
can be found in Section III.E. In addition to these metrics,
the study also considered the execution time of the tests.
Performance evaluation is a crucial aspect in comparing the
accuracy of different algorithms, and execution times may
vary based on the underlying hardware. For this project,
a server from Floydhub was leased for conducting the tests.
The leased server is equipped with a Nvidia Tesla V100
model GPU. V100 has 5120 cores and 16 GB of VRAM. The
operating frequency of each core is 1370 Mhz.
Although the focus of this study was to develop a deep
learning-based system, the results were compared with those
of traditional machine learning algorithms. Hyperparameters The findings presented in Table 6 revealed that the RNN
should be determined for the use of deep learning algorithms. architecture emerged as the most successful deep learning
Common hyperparameters used in the tests carried out within architecture, boasting an impressive test accuracy of 95.1%.
the scope of this study are: It’s worth noting that accuracy rates among the architectures
• Loss function: Binary Cross Entropy were relatively close, but RNN led the pack. Interestingly,
• Sequence size: 200 both RNN and BRNN architectures exhibited lower initial
• Update function and its parameters: ADAM; Learning validation accuracy rates compared to the other architectures.
rate: 0.01, Beta_1: 0.9, Beta_2: 0.999. Beyond accuracy rates, the evaluation of algorithm perfor-
• Character embedding dimension: 50 mance also considered the runtime durations. In the baseline
The results indicate that both the CNN and RNN archi-
tectures demonstrated superior performance on the test set
compared to the ANN architecture. Furthermore, the CNN
architecture outperformed the RNN architecture, achieving
more successful results in both the test set and the vali-
dation set. Additionally, the CNN architecture exhibited a
substantially shorter total running time, completing 20 epochs
in about eight minutes, whereas the RNN architecture took
approximately 238 minutes, encompassing vectorization and
other preprocessing tasks. In the complex scenario tests,
there was no substantial improvement observed in the ANN
FIGURE 8. Base scenario’s validation accuracies. architecture, but accuracy values increased for the CNN and
RNN architectures. These results suggest that the architec-
Apart from other performance metrics, running times play tural complexity in CNN and RNN approaches contributes
a significant role in architecture selection. While tests were positively to accuracy metrics. Notably, the complex scenario
tests indicated increased running times for all tested architec- TABLE 9. Performance metrics of CNN1 architecture with 20 epochs.
tures, highlighting the effect of architectural complexity on
running time.
TABLE 10. Performance metrics of CNN algorithms with 20 epochs. deep learning architectures, is increasingly being adopted for
use with traditional machine learning algorithms.
The generated vectors were then subjected to testing using low-level features. It’s speculated that traditional machine
three different traditional machine learning algorithms. One learning algorithms, which tend to emphasize high-level fea-
of the primary objectives of testing these traditional algo- tures, could potentially yield improved results if they could
rithms was to highlight the differences between the training utilize word-based features. However, such an investigation
processes employed in deep learning approaches and to eval- is beyond the scope of this study.
uate the accuracy rates achieved by deep learning methods
when applied to the same problem. This comparison allowed E. EVALUATION CRITERIA
for an assessment of the necessity of employing deep learning The system developed in this article will analyze whether a
techniques for solving the phishing detection problem, ulti- URL is phishing or legitimate. In the case of binary classi-
mately demonstrating that deep learning architectures were fication problems, four different situations may occur in the
more effective in addressing this issue. test phase. These are the following:
The three algorithms tested were Random Forest, Logistic • False Negative (FN): A condition in which a harmful
Regression, and Naive Bayes, which are statistics-based algo- URL is classified as clean.
rithms. The small dataset used in these experiments contained • False Positive (FP): This is the case where the URL is
364,199 training samples, 104,576 validation samples, and reported as harmful even if it is not harmful. In this
51,510 test samples. The performance values obtained on case, the system does not allow this access when the user
the small dataset using these traditional machine learning wants to access a legitimate domain.
algorithms are presented in Table 12 on the validation set • True Negative (TN): A clean condition of clean URLs.
using the 50 and 10,000-dimensional vectors. The second • True Positive (TP): This is where harmful URLs are
vectorization method is tested with traditional algorithms classified as harmful.
involving character embeddings.
TP
Precision = (1)
TABLE 12. Performance metrics FOR 50/10000 dimensional vectors.
TP + FP
TP
Recall = (2)
TP + FN
Precision × Recall
F − Measure = 2 × (3)
Precision + Recall
TP + TN
Accuracy = (4)
TP + TN + FN + FP
In case of a successful binary classification problem, it is
expected that the number of samples related to TP and TN
status will be higher, and the number of samples related to
FP and FN status will be lower.
The metrics used for the evaluation of the test results are
as follows: precision, recall, f-measure, and accuracy. These
statistics, whose formulation is depicted in Equations (1)–
In this method, each URL is represented by a 50 and (4), are also important for making a comparison between the
10,000-dimensional vectors calculated as the average of all tested machine learning approaches.
character embeddings within the URL.
The average values are taken at the same index number for VI. DISCUSSION
each character embedding. For instance, the first value of the In this research paper, the primary objective is to create
output vector is computed as the average of the first values a high-performing phishing detection system using Deep
of all character embeddings. According to the results, the Learning techniques. To achieve this goal, a substantial
logistic regression algorithm was the most successful with the amount of data is required for training and testing the detec-
vectorization created by concatenation, achieving a validation tion system effectively. Within the context of this study,
accuracy of 0.938. On the other hand, the Random Forest a significant dataset was collected and made publicly avail-
algorithm was the most successful with a validation accuracy able for the specific purpose of detecting phishing attacks.
of 0.877. Notably, this dataset is one of the largest known datasets for
The highest accuracy rate observed in the tests using deep phishing detection in academic literature.
learning was 0.987. The results of traditional machine learn- The dataset comprises a total of 2,320,893 URLs associ-
ing algorithms were somewhat less successful than those of ated with phishing attacks and 2,881,948 URLs correspond-
deep learning approaches. It’s worth noting that this article ing to legitimate websites. Such a large and balanced dataset
primarily employed character-based vectorization, omitting is crucial for developing and evaluating machine learning
word-based features from URLs, and thus, focusing on models capable of accurately distinguishing between phish-
low-level features. Deep learning approaches have proven ing URLs and legitimate ones. This rich dataset is expected to
more successful in detecting phishing URLs when handling contribute to the development of robust and high-performing
phishing detection algorithms. The evaluation of the dataset B. HUGE SIZE OF PHISHING AND LEGITIMATE DATA
involved the utilization of deep learning algorithms, which Constructing a dataset for an anti-phishing system is often
are known for their capability to handle extensive datasets. a challenging task. To achieve high accuracy rates with
Given the substantial volume of data, significant processing machine learning algorithms, a substantial amount of training
power is required to perform the necessary computations data is crucial.
effectively.
For the convenience of conducting experiments within this C. REAL-TIME EXECUTION
study and to facilitate further research in the field, two distinct As phishing attackers can quickly create fraudulent web
versions of the dataset were made available. The first version pages that are active for short durations, real-time detection
is a sub-sample of the dataset, comprising 10% of the com- is essential for effective prevention. The proposed system can
plete dataset, and is referred to as the ‘‘small_dataset.’’ The classify over 130,070 URLs per second, making it suitable
second version, termed the ‘‘big_dataset,’’ encompasses the for deployment in high-traffic environments. Furthermore,
entire dataset, providing researchers with a comprehensive this processing rate can be further improved by leveraging
and larger dataset to work with. These two dataset versions powerful GPUs, enhancing real-time protection capabilities.
are designed to accommodate different research needs and the
computational resources available to researchers.
D. DETECTION OF NEW WEBSITES
Deep learning algorithms are known for their reliance
The proposed system can identify new phishing websites that
on numerous hyperparameters, which are essential for
haven’t been previously classified as phishing. This capa-
fine-tuning and optimizing the performance of these models.
bility makes the system resilient against zero-day attacks,
In this study, some of the hyperparameters were adjusted
a particularly dangerous type of phishing attack. By detecting
while others were maintained at constant values. The exper-
threats at the initial stages of a URL, the system significantly
imentation process involved the use of an Nvidia Tesla
reduces the potential impact of such attacks.
V100 GPU, which was rented for the purpose of con-
ducting the tests. To identify suitable hyperparameters and
architectural configurations, initial tests were carried out E. INDEPENDENCE FROM THIRD-PARTY SERVICES
on the ‘‘small_dataset.’’ Once the optimal configuration While many works in the literature rely on third-party ser-
was determined for this dataset, it was subsequently eval- vices like ‘‘whois’’ records, web-based blacklists/whitelists,
uated on the more extensive ‘‘big_dataset.’’ Among the and network traffic measures to enhance detection and pre-
various deep learning architectures that were tested, the vention, these services can introduce delays in real-time
Convolutional Neural Network (CNN) demonstrated the execution. The proposed system operates independently of
highest level of success, achieving an impressive accuracy such third-party services, ensuring efficient and rapid phish-
rate of 98.74%. ing detection, especially in high-traffic settings.
The developed system exhibits an impressive ability to
classify over 130,000 URLs per second, and this perfor- VII. CONCLUSION AND FUTURE WORKS
mance can be further improved by utilizing more powerful The widespread use of the Internet has increased the impor-
processing units. In addition to exploring deep learning tance of the security of assets on the Internet. Phishing
architectures, traditional machine learning algorithms, such attacks are one type of cyber-attack that threatens users
as Naïve Bayes, Random Forest, and Logistic Regression, today. This type of attack is intended to exploit people’s
were also evaluated. Two different vectorization methods weaknesses. In this article, a deep learning-based system for
that utilized character embeddings were employed in these detecting fishing attacks was proposed, and five different
assessments. deep learning architectures were tested. These architectures
Among the traditional algorithms tested, the logistic are recurrent neural networks, bi-directional neural networks,
regression algorithm emerged as the most effective, achieving convolutional neural networks, artificial neural networks, and
a notable validation accuracy of 93.8% in our experiments. attention-based networks.
The proposed deep learning model on CNN structure can The study revealed that the results obtained from
reach 98.7% accuracy value system which offers several sig- deep learning approaches outperformed those of traditional
nificant advantages, as outlined below: machine learning algorithms. The primary focus of this
research was the development of a system for phishing
A. LANGUAGE INDEPENDENCE attack detection from URLs using deep learning meth-
Many phishing detection systems are heavily dependent ods. To facilitate transparency and access to the findings,
on language-specific features, making them less versatile. all application codes and datasets pertaining to the deep
In contrast, the proposed system can detect phishing using learning tests conducted in this study have been shared
URL information alone, focusing solely on the characters through Github, IEEE DataPort and Code Ocean [38], [39],
within the URL. This word-independent approach enables the [40]. These shared resources include comprehensive infor-
system to detect phishing attacks regardless of the language mation about all tests, encompassing accuracy and loss
used. plots, confusion matrices, GPU utilization data, model and
weight files, precision, recall, f1-score metrics, and execution [18] P. A. Watters, A. Herps, R. Layton, and S. McCombie, ‘‘ICANN or
times. This commitment to providing detailed information ICANT: Is WHOIS an enabler of cybercrime?’’ in Proc. 4th Cybercrime
Trustworthy Comput. Workshop, Nov. 2013, pp. 44–49, doi: 10.1109/
ensures reproducibility and thorough analysis of the study’s CTC.2013.13.
results. [19] H. Kim and J. H. Huh, ‘‘Detecting DNS-poisoning-based phishing attacks
from their network performance characteristics,’’ Electron. Lett., vol. 47,
no. 11, p. 656, 2011, doi: 10.1049/el.2011.0399.
ACKNOWLEDGMENT [20] A. Karim, M. Shahroz, K. Mustofa, S. B. Belhaouari, and S. R. K. Joga,
The authors would like to thank Roksit for their support ‘‘Phishing detection system through hybrid machine learning based
during the implementation of this work. on URL,’’ IEEE Access, vol. 11, pp. 36805–36822, 2023, doi:
10.1109/ACCESS.2023.3252366.
[21] M. K. Prabakaran, P. Meenakshi Sundaram, and A. D. Chandrasekar,
REFERENCES ‘‘An enhanced deep learning-based phishing detection mechanism to
effectively identify malicious URLs using variational autoencoders,’’
[1] Anti-Phishing Working Group. (Sep. 2022). Phishing Attacks Trends
IET Inf. Secur., vol. 17, no. 3, pp. 423–440, May 2023, doi: 10.1049/
Report-Q2 2022. Accessed: Oct. 15, 2022. [Online]. Available: https://
ise2.12106.
apwg.org/trendsreports/
[22] Z. Alshingiti, R. Alaqel, J. Al-Muhtadi, Q. E. U. Haq,
[2] Cloudflare’s 2023 Phishing Threats Report. Accessed: Oct. 1, 2023.
K. Saleem, and M. H. Faheem, ‘‘A deep learning-based phishing
[Online]. Available: https://www.cloudflare.com/lp/2023-phishing-report/
detection system using CNN, LSTM, and LSTM-CNN,’’
[3] M. Volkamer, K. Renaud, B. Reinheimer, and A. Kunz, ‘‘User expe- Electronics, vol. 12, no. 1, p. 232, Jan. 2023, doi: 10.3390/
riences of TORPEDO: Tooltip-powered phishing email detection,’’ electronics12010232.
Comput. Secur., vol. 71, pp. 100–113, Nov. 2017, doi: 10.1016/j.cose. [23] M. Sánchez-Paniagua, E. F. Fernández, E. Alegre, W. Al-Nabki, and
2017.02.004. V. González-Castro, ‘‘Phishing URL detection: A real-case scenario
[4] N. Q. Do, A. Selamat, O. Krejcar, E. Herrera-Viedma, and H. Fujita, through login URLs,’’ IEEE Access, vol. 10, pp. 42949–42960, 2022, doi:
‘‘Deep learning for phishing detection: Taxonomy, current challenges and 10.1109/ACCESS.2022.3168681.
future directions,’’ IEEE Access, vol. 10, pp. 36429–36463, 2022, doi: [24] S. He, B. Li, H. Peng, J. Xin, and E. Zhang, ‘‘An effective cost-
10.1109/ACCESS.2022.3151903. sensitive XGBoost method for malicious URLs detection in imbal-
[5] T. Mahara, V. L. H. Josephine, R. Srinivasan, P. Prakash, A. D. Algarni, anced dataset,’’ IEEE Access, vol. 9, pp. 93089–93096, 2021, doi:
and O. P. Verma, ‘‘Deep vs. shallow: A comparative study of 10.1109/ACCESS.2021.3093094.
machine learning and deep learning approaches for fake health [25] S. Tiwari, H. Rizvi, and K. Kalaiselvi, ‘‘Malicious website naviga-
news detection,’’ IEEE Access, vol. 11, pp. 79330–79340, 2023, doi: tion prevention using CNNs and URL vectors: A study,’’ in Proc. Int.
10.1109/ACCESS.2023.3298441. Conf. Comput. Commun. Informat. (ICCCI), Jan. 2022, pp. 1–6, doi:
[6] Google Safe Browsing. Accessed: Oct. 1, 2023. [Online]. Available: 10.1109/ICCCI54379.2022.9741056.
https://safebrowsing.google.com/ [26] T. Rasymas and L. Dovydaitis, ‘‘Detection of phishing URLs by
[7] (2019). Office 365 Advanced Threat Protection Safe Links. Accessed: using deep learning approach and multiple features combinations,’’
Jul. 10, 2023. [Online]. Available: https://docs.microsoft.com/en- Baltic J. Modern Comput., vol. 8, no. 3, pp. 471–483, Sep. 2020, doi:
us/office365/securitycompliance/atp-safe-links 10.22364/bjmc.2020.8.3.06.
[8] A. K. Jain and B. B. Gupta, ‘‘A novel approach to protect against phish- [27] T. Feng and C. Yue, ‘‘Visualizing and interpreting RNN models in
ing attacks at client side using auto-updated white-list,’’ EURASIP J. URL-based phishing detection,’’ in Proc. 25th ACM Symp. Access
Inf. Secur., vol. 2016, no. 1, pp. 1–11, Dec. 2016, doi: 10.1186/s13635- Control Models Technol., Jun. 2020, pp. 13–24, doi: 10.1145/3381991.
016-0034-3. 3395602.
[9] N. A. Azeez, S. Misra, I. A. Margaret, L. Fernandez-Sanz, and [28] A. Aljofey, Q. Jiang, Q. Qu, M. Huang, and J.-P. Niyigena, ‘‘An effective
S. M. Abdulhamid, ‘‘Adopting automated whitelist approach for detecting phishing detection model based on character level convolutional neural
phishing attacks,’’ Comput. Secur., vol. 108, Sep. 2021, Art. no. 102328, network from URL,’’ Electronics, vol. 9, no. 9, p. 1514, Sep. 2020, doi:
doi: 10.1016/j.cose.2021.102328. 10.3390/electronics9091514.
[10] N. Abdelhamid, A. Ayesh, and F. Thabtah, ‘‘Phishing detection based [29] Y. Huang, Q. Yang, J. Qin, and W. Wen, ‘‘Phishing URL detec-
associative classification data mining,’’ Expert Syst. Appl., vol. 41, no. 13, tion via CNN and attention-based hierarchical RNN,’’ in Proc. 18th
pp. 5948–5959, Oct. 2014, doi: 10.1016/j.eswa.2014.03.019. IEEE Int. Conf. Trust, Secur. Privacy Comput. Commun./13th IEEE Int.
[11] M. Moghimi and A. Y. Varjani, ‘‘New rule-based phishing detection Conf. Big Data Sci. Eng., Aug. 2019, pp. 112–119, doi: 10.1109/Trust-
method,’’ Expert Syst. Appl., vol. 53, pp. 231–242, Jul. 2016, doi: Com/BIGDATASE.2019.00024.
10.1016/j.eswa.2016.01.028. [30] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, ‘‘Machine learning based
[12] M. SatheeshKumar, K. G. Srinivasagan, and G. UnniKrishnan, phishing detection from URLs,’’ Expert Syst. Appl., vol. 117, pp. 345–357,
‘‘A lightweight and proactive rule-based incremental construction Mar. 2019, doi: 10.1016/j.eswa.2018.09.029.
approach to detect phishing scam,’’ Inf. Technol. Manage., [31] S. Singh, M. P. Singh, and R. Pandey, ‘‘Phishing detection from
vol. 23, no. 4, pp. 271–298, Dec. 2022, doi: 10.1007/s10799- URLs using deep learning approach,’’ in Proc. 5th Int. Conf.
021-00351-7. Comput., Commun. Secur. (ICCCS), Oct. 2020, pp. 1–4, doi:
[13] A. K. Jain and B. B. Gupta, ‘‘Phishing detection: Analysis of visual 10.1109/ICCCS49678.2020.9277459.
similarity based approaches,’’ Secur. Commun. Netw., vol. 2017, pp. 1–20, [32] L. Tang and Q. H. Mahmoud, ‘‘A deep learning-based framework for
Oct. 2017, doi: 10.1155/2017/5421046. phishing website detection,’’ IEEE Access, vol. 10, pp. 1509–1521, 2022,
[14] E. Medvet, E. Kirda, and C. Kruegel, ‘‘Visual-similarity-based phishing doi: 10.1109/ACCESS.2021.3137636.
detection,’’ in Proc. 4th Int. Conf. Secur. Privacy Commun. Netowrk, [33] J. Anitha and M. Kalaiarasu, ‘‘A new hybrid deep learning-based
Sep. 2008, pp. 1–6, doi: 10.1145/1460877.1460905. phishing detection system using MCS-DNN classifier,’’ Neural Comput.
[15] W. Liu, X. Deng, G. Huang, and A. Y. Fu, ‘‘An antiphishing strategy based Appl., vol. 34, no. 8, pp. 5867–5882, Apr. 2022, doi: 10.1007/s00521-
on visual similarity assessment,’’ IEEE Internet Comput., vol. 10, no. 2, 021-06717-w.
pp. 58–65, Mar. 2006, doi: 10.1109/MIC.2006.23. [34] S. Das Guptta, K. T. Shahriar, H. Alqahtani, D. Alsalman, and
[16] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, ‘‘Visual similarity based I. H. Sarker, ‘‘Modeling hybrid feature-based phishing websites detection
anti-phishing with the combination of local and global features,’’ in Proc. using machine learning techniques,’’ Ann. Data Sci., vol. 2022, pp. 1–26,
IEEE 13th Int. Conf. Trust, Secur. Privacy Comput. Commun., Sep. 2014, Mar. 2022, doi: 10.1007/s40745-022-00379-8.
pp. 189–196, doi: 10.1109/TRUSTCOM.2014.28. [35] M. Alshehri, A. Abugabah, A. Algarni, and S. Almotairi, ‘‘Character-
[17] G. Varshney, M. Misra, and P. K. Atrey, ‘‘Improving the accuracy of search level word encoding deep learning model for combating cyber
engine based anti-phishing solutions using lightweight features,’’ in Proc. threats in phishing URL detection,’’ Comput. Electr. Eng.,
11th Int. Conf. Internet Technol. Secured Trans. (ICITST), Dec. 2016, vol. 100, Mar. 2022, Art. no. 107868, doi: 10.1016/j.compeleceng.
pp. 365–370, doi: 10.1109/ICITST.2016.7856731. 2022.107868.
[36] A. Mughaid, S. AlZu’bi, A. Hnaif, S. Taamneh, A. Alnajjar, and EBUBEKIR BUBER received the bachelor’s, grad-
E. A. Elsoud, ‘‘An intelligent cyber security phishing detection sys- uate, and Ph.D. degrees in artificial intelligence,
tem using deep learning techniques,’’ Cluster Comput., vol. 25, no. 6, and the master’s degree in cyber security.
pp. 3819–3828, Dec. 2022, doi: 10.1007/s10586-022-03604-4. He was the Manager in projects involving arti-
[37] Z.-H. Zhan, J.-Y. Li, and J. Zhang, ‘‘Evolutionary deep learning: ficial intelligence in the field of cyber security
A survey,’’ Neurocomputing, vol. 483, pp. 42–58, Apr. 2022, doi: during his business experience. To develop more
10.1016/j.neucom.2022.01.099. efficient projects in this field, he received the mas-
[38] Github Resources. Accessed: Dec. 3, 2023. [Online]. Available: ter’s degree. For over seven years, he has been
https://github.com/ebubekirbbr/phishing_url_detection
working on artificial intelligence projects in the
[39] Deep Learning Based Phishing Detection System (DEPHIDES).
field of cyber security. He has also created several
Accessed: Dec. 3, 2023. [Online]. Available: https://codeocean.com/
capsule/0874584/tree academic publications on AI and cyber security.
[40] Phishing Attack Dataset. Accessed: Dec. 3, 2023. [Online]. Available:
https://dx.doi.org/10.21227/4098-8c60