AntiPhishStack 2.0: A Transformer-Driven Framework for Robust Phishing URL Detection

Abstract

Phishing attacks have become a widely widespread cybersecurity threat, exploiting consumer vulnerabilities by mimicking legitimate web sites to thieve touchy facts. current detection structures regularly fail to adapt to evolving attack styles, in particular 0-day phishing attacks. This paper introduces AntiPhishStack 2.0, an enhanced phishing URL detection framework that leverages transformer-primarily based contextual analysis, GRUs with attention mechanisms for sequential dependencies, and superior characteristic engineering techniques. The machine employs a hybrid two-phase architecture and a CatBoost meta-classifier to obtain advanced detection accuracy, efficiency, and adaptability. Experimental effects on benchmark datasets show a detection accuracy of 98.01%, outperforming conventional models. The inclusion of light-weight deployment alternatives, along with TensorFlow Lite and ONNX, ensures actual-time applicability even in resource-limited environments. AntiPhishStack 2.0 sets a new benchmark in phishing detection, imparting sturdy defenses against sophisticated phishing strategies.

Country : India

1 Shaik Irshad Ahammad2 Amanchi Kalpana3 Karthikram A

  1. UG Student, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, India
  2. UG Student, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, India
  3. Assistant Professor, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 255-260

doi.org/10.47001/IRJIET/2025.INSPIRE41

References

  1. A.Almomani, B. Gupta, S. Atawneh, A. Meulenberg, and E. Almomani, "A Survey of Phishing Email Filtering Techniques," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2070-2090, 2013.
  2. M. Khonji, Y. Iraqi, and A. Jones, "Phishing Detection: A Literature Survey," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2091-2121, 2013.
  3. N. Papernot, P. McDaniel, A. Swami, and R. Harang, "Crafting Adversarial Input Sequences for Recurrent NeuralnNetworks," IEEE MILCOM Conference, pp. 49-54, 2016.
  4. D. Devlin, M. Chang, K. Lee, and J. Toutanova, "BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding," Proceedings of the NAACL-HLT Conference, pp. 4171-4186, 2019.
  5. Y. Liu, M. Ott, N. Goyal, J. Du, M. Joshi, D. Chen, O. Levy, M. Lewis, L. Zettlemoyer, and V. Stoyanov, "RoBERTa: A Robustly Optimized BERT Pretraining Approach," arXiv preprint arXiv:1907.11692, 2019.
  6. S.Hochreiter and J. Schmidhuber, "Long Short-Term Memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, 1997.
  7. T.Mikolov, K. Chen, G. Corrado, and J. Dean, "Efficient Estimation of Word Representations in Vector Space," arXiv preprint arXiv:1301.3781, 2013.
  8. S. Ruder, "An Overview of Multi-Task Learning in Deep Neural Networks," arXiv preprint arXiv:1706.05098, 2017.
  9. S. Krishnamurthy and B. S. Kesavan, "Detection of Phishing URLs Using Machine Learning Techniques," International Journal of Computer Applications, vol. 178, no. 7, pp. 15-22, 2019.
  10. H. Feng, E. H. Chang, and G. Sun, "A Support Vector Machine-Based Text Categorization for Phishing Emails," IEEE Transactions on Systems, Man, and Cybernetics, vol. 40, no. 6, pp. 1703-1712, 2010.
  11. D. Canali, D. Balzarotti, and A. Francillon, "Mitigating Web Vulnerabilities Through Automatic Analysis of Client-Side JavaScript," Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), pp. 231-240, 201.