Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

被引:0
作者
Ahmad, Shakeel [1 ]
Zaman, Muhammad [1 ]
Al-Shamayleh, Ahmad Sami [2 ]
Ahmad, Rahiel [1 ]
Abdulhamid, Shafi'I Muhammad [3 ]
Ergen, Ismail [4 ]
Akhunzada, Adnan [5 ]
机构
[1] Univ Lahore, Fac Comp Sci, Lahore 40100, Pakistan
[2] Al Ahliyya Amman Univ, Fac Informat Technol, Dept Data Sci & Artificial Intelligence, Amman 19328, Jordan
[3] Community Coll Qatar, Dept Informat Technol, Sci & Technol Div, Doha, Qatar
[4] Istinye Univ, Fac Digital Game Design, Dept Fine Art Design & Architecture, TR-34396 Istanbul, Turkiye
[5] Univ Doha Sci & Technol, Coll Comp & IT, Dept Data & Cybersecur, Doha, Qatar
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2025年 / 6卷
关键词
Phishing; Computer security; Electronic mail; Blocklists; Biological system modeling; Accuracy; Computational modeling; Anomaly detection; blocklists; cyber-attack mitigation; cybersecurity; deep learning (DL); machine learning (ML); phishing detection; threat intelligence; Web phishing detection; whitelists; FEATURE-SELECTION; ALGORITHM; URLS;
D O I
10.1109/OJCOMS.2024.3462503
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling. Phishing attacks are particularly significant among Web phishing techniques. In a phishing attack, the attacker creates a fake website that closely resembles a legitimate one to deceive users into providing sensitive information. These attacks can be detected using both traditional and modern AI-based models. However, even with state-of-the-art methods, accurately classifying newly emerged links as phishing or legitimate remains a challenge. This study conducts a comparative analysis of more than 130 articles published between 2020 and 2024, identifying challenges and gaps in the literature and comparing the findings of various authors. The novelty of this research lies in providing a roadmap for researchers, practitioners, and cybersecurity experts to navigate the landscape of machine learning (ML) and deep learning (DL) models for phishing detection. The study reviews traditional phishing detection methods, ML and DL models, phishing datasets, and the step-by-step phishing process. It highlights limitations, research gaps, weaknesses, and potential improvements. Accuracy measures are used to compare model performance. In conclusion, this research provides a comprehensive survey of website phishing detection using AI models, offering a new roadmap for future studies.
引用
收藏
页码:2065 / 2089
页数:25
相关论文
共 157 条
  • [1] Classification of Malicious URLs Using Machine Learning
    Abad, Shayan
    Gholamy, Hassan
    Aslani, Mohammad
    [J]. SENSORS, 2023, 23 (18)
  • [2] Abdulrahman L., 2023, J. Appl. Sci. Technol. Trends, V4, P54
  • [3] Abiodun O., 2020, Acta Informatica Malaysia, V4, P37
  • [4] Intelligent phishing detection scheme using deep learning algorithms
    Adebowale, Moruf Akin
    Lwin, Khin T.
    Hossain, M. A.
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2023, 36 (03) : 747 - 766
  • [5] Adeyemo Victor E., 2021, Advances in Cyber Security: Second International Conference, ACeS 2020. Communications in Computer and Information Science (1347), P627, DOI 10.1007/978-981-33-6835-4_41
  • [6] Blockchain Technology for Secure Supply Chain Management: A Comprehensive Review
    Agarwal, Udit
    Rishiwal, Vinay
    Tanwar, Sudeep
    Chaudhary, Rashmi
    Sharma, Gulshan
    Bokoro, Pitshou N.
    Sharma, Ravi
    [J]. IEEE ACCESS, 2022, 10 : 85493 - 85517
  • [7] A systematic review of trustworthy and explainable artificial intelligence in healthcare: Assessment of quality, bias risk, and data fusion
    Albahri, A. S.
    Duhaim, Ali M.
    Fadhel, Mohammed A.
    Alnoor, Alhamzah
    Baqer, Noor S.
    Alzubaidi, Laith
    Albahri, O. S.
    Alamoodi, A. H.
    Bai, Jinshuai
    Salhi, Asma
    Santamaria, Jose
    Ouyang, Chun
    Gupta, Ashish
    Gu, Yuantong
    Deveci, Muhammet
    [J]. INFORMATION FUSION, 2023, 96 : 156 - 191
  • [8] Alhussan A., 2023, Int. J. Wireless Ad Hoc Commun., V6, P8
  • [9] Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting
    Ali, Waleed
    Ahmed, Adel A.
    [J]. IET INFORMATION SECURITY, 2019, 13 (06) : 659 - 669
  • [10] Aljammal Ashraf H., 2023, International Journal of Interactive Mobile Technologies, P71, DOI 10.3991/ijim.v17i05.37575