The effectiveness of machine learning in detecting phishing websites
Article Sidebar
Open full text
Issue Vol. 15 No. 3 (2025)
-
Objects features extraction by singular projections of data tensor to matrices
Yuriy Bunyak, Roman Kvуetnyy, Olga Sofina, Volodymyr Kotsiubynskyi5-9
-
A hybrid approach combining generalized normal distribution optimization algorithm and fuzzy C-means with Calinski-Harabasz index for clustering optimization
Moatasem Mahmood Ibrahim, Omar Saber Qasim, Talal Fadhil Hussein10-14
-
Method of hybrid logical classification trees based on group selection of discrete features
Igor Povkhan, Andrii Leheza, Oksana Mulesa, Olena Melnyk, Aliya Kintonova15-21
-
Optimal control of electric energy quality, based on lexicographic approach
Yurii Voitiuk, Anatolii Volotskyi, Iuliia Shullie, Maiia Kovalchuk, Laura Duissembayeva22-28
-
Implementation of energy-saving modes for electro-radiation drying of oil-containing material using automation tools
Borys Kotov, Roman Kalinichenko, Serhii Stepanenko, Vasyl Lukach, Volodymyr Hryshchenko, Alvian Kuzmych, Yurii Pantsyr, Ihor Garasymchuk, Volodymyr Vasylyuk29-32
-
Methods and means of laser layer Jones matrix mapping of polycrystalline films of biological fluids
Olexander Ushenko, Iryna Soltys, Olexander Dubolazov, Sergii Pavlov, Vasyl Garasym, Alona Kolomiiets, Bakhyt Yeraliyeva33-37
-
Alzheimer’s disease classification from MRI using vision transformer
Mohith Reddy Kandi, Sree Vijaya Lakshmi Kothapalli, Sivamsh Pavan Rajanala, Suvarna Vani Koneru, Vishnu Pramukh Vattikunta38-44
-
Enhancing early Parkinson’s disease diagnosis through handwriting analysis
Asma Ouabd, Abdelilah Jilbab, Achraf Benba, Ahmed Hammouch45-49
-
Biomechanical foundations and benefits of active orthoses in the treatment of idiopathic scoliosis
Patrycja Tymińska-Wójcik50-54
-
Application of facial recognition technologies for enhancing control in information security systems
Nurzhigit Smailov, Rashida Kadyrova, Kamila Abdulina, Fatima Uralova, Nurgul Kubanova, Akezhan Sabibolda55-58
-
IoT system with frequency converters of physical quantities on FPGA
Oleksandr V. Osadchuk, Iaroslav O. Osadchuk, Valentyn K. Skoshchuk59-66
-
Research on the possibility of reducing the error in measuring the phase shift of radio signals
Sergey Matvienko, Grygoriy Tymchyk, Konstantin Vonsevych, Nataliia Stelmakh67-72
-
Implementation of fiber-optic sensing systems in structural health monitoring of concrete
Nurzhigit Smailov, Akmaral Tolemanova, Amir Aziskhan, Beibarys Sekenov, Akezhan Sabibolda73-76
-
Modelling the working cycle of a heat pump scroll compressor
Bohdan Sydorchuk, Oleksandr Naumchuk77-80
-
Modeling of interception parking lots
Larysa Gumeniuk, Volodymyr Lotysh, Pavlo Humeniuk, Oleksandr Reshetylo, Yuriy Syrota81-86
-
Development and research of W-parameters of potentially unstable four-poles based on the mathematical model of W-parameters of field-effect transistors in the high-frequency range
Oleksandr Voznyak, Kateryna Kovalova, Yurii Polievoda, Liudmyla Kolianovska, Svitlana Ovsienko, Alla Solomon87-90
-
Detection confidential information by large language models
Oleh Deineka, Oleh Harasymchuk, Andrii Partyka, Yurii Dreis, Yuliia Khokhlachova, Yuriy Pepa91-99
-
Ethical simulation of a phishing attack
Justyna Kęczkowska, Karol Wykrota, Mirosław Płaza100-104
-
The effectiveness of machine learning in detecting phishing websites
Jacek Łukasz Wilk-Jakubowski, Aleksandra Sikora, Dawid Maciejski105-109
-
Contemporary approaches to integrating AI agents into library information processes
Mariia Sokil, Andriy Andrukhiv110-116
-
Development of a reinforcement learning-based adaptive scheduling algorithm for commercial smart kitchens
Konrad Kabala, Piotr Dziurzanski, Agnieszka Konrad117-122
-
Optimizing deep learning techniques with stacking BiLSTM and BiGRU models for gold price prediction
Iqbal Kharisudin, Nike Yustina Oktaviani123-130
-
Websites with virtual church tours in Poland – usability and accessibility analysis
Michał Mitura, Mariusz Dzieńkowski131-137
-
Study of feed granulation process based on system analysis – justification of optimization criteria
Mahil Isa Mammadov138-142
Archives
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
Main Article Content
DOI
Authors
Abstract
Phishing poses a significant risk in the field of digital security, requiring effective methods for identifying fraudulent websites. This study evaluated the performance of nine machine learning classification models in the context of phishing website detection. Two different input datasets were prepared: the first included the full HTML code, while the second was based on a set of features extracted from that code. The analysis revealed that models trained on the extracted features achieved nearly twice the detection performance compared to those operating on raw HTML code. The use of majority voting further improved classification effectiveness. The study results confirm that proper feature selection and the integration of outputs from multiple models significantly enhance the effectiveness of systems for detecting online threats.
Keywords:
References
[1] Albishri A. A., Dessouky M. M.: A comparative analysis of machine learning techniques for URL phishing detection. Engineering, Technology & Applied Science Research 14(6), 2024, 18495–18501 [https://doi.org/10.48084/etasr.8920]. DOI: https://doi.org/10.48084/etasr.8920
[2] Arvind N.: Phiusiil phishing URL dataset (Version 1) [https://www.kaggle.com/datasets/ndarvind/phiusiil-phishing-url-dataset] (available: 19.03.2025).
[3] Carreras-Coch A., et al.: Communication Technologies in Emergency Situations. Electronics 11(7), 2022, 1155 [https://doi.org/10.3390/electronics11071155]. DOI: https://doi.org/10.3390/electronics11071155
[4] Géron A.: Uczenie maszynowe z użyciem Scikit-Learn, Keras i TensorFlow. Wyd. 3, Helion, 2023.
[5] Hadnagy C., Fincher M., Dreeke R.: Mroczne odmęty phishingu. Nie daj się złowić! Helion, 2018.
[6] Hadnagy C.: Social engineering: the art of human hacking. Wiley Publishing, 2011.
[7] Hastie T., Tibshirani R., Friedman J.: The elements of statistical learning: data mining, inference, and prediction. Springer, 2009. DOI: https://doi.org/10.1007/978-0-387-84858-7
[8] Jha A.: Fight fraud with machine learning. Manning Publications, 2023.
[9] Liu B.: Web data mining: exploring hyperlinks, contents, and usage data. 2nd ed., Springer, 2011. DOI: https://doi.org/10.1007/978-3-642-19460-3
[10] Mitchell R.: Web scraping with Python: collecting data from the modern web. 2nd ed., O’Reilly Media, 2018.
[11] Murphy K.P.: Machine learning: a probabilistic perspective. MIT Press, 2012.
[12] PhishTank: Phishing website database [https://phishtank.org/] (accessed: 22.03.2025).
[13] Reyes-Dorta N., Caballero-Gil P., Rosa-Remedios C.: Detection of malicious URLs using machine learning. Wireless Networks 30, 2024, 7543–7560 [https://doi.org/10.1007/s11276-024-03700-w]. DOI: https://doi.org/10.1007/s11276-024-03700-w
[14] Sasanuma M., et al.: Research and development of very small aperture terminals (VSAT) that can be installed by easy operation during disasters – Issues and the solutions for implementing simple and easy installation of VSAT earth station. IEICE 112(440), 2013, 1–3.
[15] Shalev-Shwartz S., Ben-David S.: Understanding machine learning: from theory to algorithms. Cambridge University Press, 2014. DOI: https://doi.org/10.1017/CBO9781107298019
[16] Shashwat A.: Web page phishing detection dataset (Version 1) [https://www.kaggle.com/datasets/shashwatwork/web-page-phishing-detection-dataset] (available: 23.03.2025).
[17] Suematsu N., et al.: Multi-mode SDR VSAT against big disasters. European Microwave Conference’13, Nuremberg, 2013 [https://doi.org/10.23919/EuMC.2013.6686788].
[18] Tashtoush Y., et al.: Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features. Cluster Computing 27, 2024, 13717–13736 [https://doi.org/10.1007/s10586-024-04655-5]. DOI: https://doi.org/10.1007/s10586-024-04655-5
[19] Wilk-Jakubowski J. Ł.: A review on information systems engineering using VSAT networks and their development directions. Yugoslav Journal of Operations Research 31(3), 2021, 409–428 [https://doi.org/10.2298/YJOR200215015W]. DOI: https://doi.org/10.2298/YJOR200215015W
[20] Wilk-Jakubowski J. Ł.: Broadband satellite data networks in the context of the available protocols and digital platforms. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOŚ 2, 2021, 56–60 [https://doi.org/10.35784/iapgos.2630]. DOI: https://doi.org/10.35784/iapgos.2630
Article Details
Abstract views: 174
Jacek Łukasz Wilk-Jakubowski, Kielce University of Technology, Department of Information Systems
He is an associate professor at the Kielce University of Technology, Faculty of Electrical Engineering, Automatic Control and Computer Science, Department of Information Systems. He was awarded the doctor of technical science degree (with the specialization in ICT, Teleinformatics, Data Transmission and Signal Processing) and doctor of science (habilitation) degree in the Informatics and Computer Science discipline. He is the author of several inventions that have been granted protection by the Patent Office, participant of many national and international conferences and projects, and laureate of several awards, among others for patents. He is the author more than 90 scientific publications (including 5 monographs, 5 chapters in monographs, as well as more than 80 papers).
Aleksandra Sikora, Kielce University of Technology, Department of Computer Science, Electronics and Electrical Engineering
She is an assistant professor at the Kielce University of Technology in the Faculty of Electrical Engineering, Automatic Control and Computer Science, Department of Computer Science, Electronics and Electrical Engineering. She has participated in numerous IT projects integrating scientific research with student education in areas such as cybersecurity, big data, machine learning, and digital metrology.
Dawid Maciejski, Kielce University of Technology, Faculty of Electrical Engineering, Automatic Control and Computer Science
A graduate of second-cycle studies in Computer Science, specializing in Cybersecurity, at the Faculty of Electrical Engineering, Automation, and Computer Science at the Kielce University of Technology, completed in 2025. His main areas of interest include developing machine learning methods, issues related to computer networks, and user security on the Internet.

