AntiPhishStack 2.0: A Transformer-Driven Framework for Robust Phishing URL Detection

Shaik Irshad AhammadUG Student, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, IndiaAmanchi KalpanaUG Student, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, IndiaKarthikram AAssistant Professor, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, India

Vol 9 No 25 (2025): Volume 9, Special Issue of INSPIRE’25 April 2025 | Pages: 255-260

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 24-04-2025

doi Logo doi.org/10.47001/IRJIET/2025.INSPIRE41

Abstract

Phishing attacks have become a widely widespread cybersecurity threat, exploiting consumer vulnerabilities by mimicking legitimate web sites to thieve touchy facts. current detection structures regularly fail to adapt to evolving attack styles, in particular 0-day phishing attacks. This paper introduces AntiPhishStack 2.0, an enhanced phishing URL detection framework that leverages transformer-primarily based contextual analysis, GRUs with attention mechanisms for sequential dependencies, and superior characteristic engineering techniques. The machine employs a hybrid two-phase architecture and a CatBoost meta-classifier to obtain advanced detection accuracy, efficiency, and adaptability. Experimental effects on benchmark datasets show a detection accuracy of 98.01%, outperforming conventional models. The inclusion of light-weight deployment alternatives, along with TensorFlow Lite and ONNX, ensures actual-time applicability even in resource-limited environments. AntiPhishStack 2.0 sets a new benchmark in phishing detection, imparting sturdy defenses against sophisticated phishing strategies.

Keywords

Phishing URL Detection, Hybrid Two-Phase Architecture, CatBoost Meta-Classifier, Zero-Day Phishing Attacks, Real-Time Detection


Citation of this Article

Shaik Irshad Ahammad, Amanchi Kalpana, & Karthikram A. (2025). AntiPhishStack 2.0: A Transformer-Driven Framework for Robust Phishing URL Detection. In proceeding of International Conference on Sustainable Practices and Innovations in Research and Engineering (INSPIRE'25), published by IRJIET, Volume 9, Special Issue of INSPIRE’25, pp 255-260. Article DOI https://doi.org/10.47001/IRJIET/2025.INSPIRE41

References
  1. A.Almomani, B. Gupta, S. Atawneh, A. Meulenberg, and E. Almomani, "A Survey of Phishing Email Filtering Techniques," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2070-2090, 2013.
  2. M. Khonji, Y. Iraqi, and A. Jones, "Phishing Detection: A Literature Survey," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2091-2121, 2013.
  3. N. Papernot, P. McDaniel, A. Swami, and R. Harang, "Crafting Adversarial Input Sequences for Recurrent NeuralnNetworks," IEEE MILCOM Conference, pp. 49-54, 2016.
  4. D. Devlin, M. Chang, K. Lee, and J. Toutanova, "BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding," Proceedings of the NAACL-HLT Conference, pp. 4171-4186, 2019.
  5. Y. Liu, M. Ott, N. Goyal, J. Du, M. Joshi, D. Chen, O. Levy, M. Lewis, L. Zettlemoyer, and V. Stoyanov, "RoBERTa: A Robustly Optimized BERT Pretraining Approach," arXiv preprint arXiv:1907.11692, 2019.
  6. S.Hochreiter and J. Schmidhuber, "Long Short-Term Memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, 1997.
  7. T.Mikolov, K. Chen, G. Corrado, and J. Dean, "Efficient Estimation of Word Representations in Vector Space," arXiv preprint arXiv:1301.3781, 2013.
  8. S. Ruder, "An Overview of Multi-Task Learning in Deep Neural Networks," arXiv preprint arXiv:1706.05098, 2017.
  9. S. Krishnamurthy and B. S. Kesavan, "Detection of Phishing URLs Using Machine Learning Techniques," International Journal of Computer Applications, vol. 178, no. 7, pp. 15-22, 2019.
  10. H. Feng, E. H. Chang, and G. Sun, "A Support Vector Machine-Based Text Categorization for Phishing Emails," IEEE Transactions on Systems, Man, and Cybernetics, vol. 40, no. 6, pp. 1703-1712, 2010.
  11. D. Canali, D. Balzarotti, and A. Francillon, "Mitigating Web Vulnerabilities Through Automatic Analysis of Client-Side JavaScript," Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), pp. 231-240, 201.