AI-Powered Phishing Detection: Securing Web Navigation with Machine Learning
DOI:
https://doi.org/10.15662/IJEETR.2026.0802166Keywords:
AI-powered phishing detection, machine learning for web security, URL classification using AI, cybersecurity with machine learning, phishing attack prevention, intelligent threat detection, real-time phishing detectionAbstract
Phishing attacks are one of the most serious cybersecurity threats, where attackers create fraudulent websites to steal sensitive information such as login credentials, banking details, and personal data. Traditional protection methods like blacklists and antivirus tools are often ineffective because phishing websites are continuously evolving. This research proposes an AI-powered phishing detection system using Machine Learning techniques to improve web security. The proposed system analyzes URLs and website characteristics to distinguish between legitimate and phishing websites. A dataset containing more than 6000 URLs is used for training and evaluation. The system extracts multiple important features from URLs and webpage data, including lexical features, security- related attributes such as HTTPS usage and domain age, host- based information, and website popularity indicators. These features are preprocessed and converted into numerical form to train machine learning models effectively. Among the evaluated algorithms, the Gradient Boosting Classifier provided the best performance. The model achieved a detection accuracy of approximately 97. The proposed approach improves online security by detecting malicious websites before users interact with them. Unlike traditional blacklist systems, the machine learning model can identify new phishing patterns. This system can be further extended into browser extensions or scalable web services for enhanced phishing protection and safer web navigation.
References
1. Puente, H. Gonza´lez-Jorge, J. Mart´ınez-Sa´nchez, and P. Arias, “Re- view of mobile mapping and surveying technologies,” Measurement, vol. 46, no. 7, pp. 2127–2145, 2013.
2. S. S. Shafin, “An explainable feature selection framework for web phish- ing detection with machine learning,” Data Science and Management, vol. 8, pp. 127–136, 2025.
3. I. Lee, C. Kiekintveld, and A. Piplai, “An investigation into the per- formances of state-of-the-art machine learning approaches for various cyber-attack detection,” arXiv preprint, arXiv:2402.17045, 2024.
4. J. Lee, Z. Xin, M. Ng, P. Se, K. Sabharwal, G. Apruzzese, and D.
5. M. Divakaran, “Attacking logo-based phishing website detectors with adversarial perturbations,” arXiv preprint, arXiv:2308.09392, 2023.
6. P. C. R. Chinta, C. S. Moore, L. M. Karaka, M. Sakuru, V. Bodepudi, and S. R. Moka, “Building an intelligent phishing email detection system using machine learning and feature engineering,” European Journal of Applied Science, Engineering and Technology, vol. 3, no. 2, pp. 41–54, 2025.
7. J. A. Ochu, G. I. O. Almufuh, H. Musa, and S. E. Chaku, “Detecting phishing websites using large language model,” Science World Journal, vol. 20, no. 2, pp. 692–697, 2025.
8. O. T. Agboola, “Development of a novel approach to phishing detection using machine learning,” Journal of Science Technology and Education, vol. 12, no. 2, pp. 336–351, 2024.
9. C.Nagarajan and M.Madheswaran - ‘Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques’- Taylor &Francis, Electric Power Components and Systems, Vol.39 (8), pp.780-793, May 2011. DOI: 10.1080/15325008.2010.541746
10. C.Nagarajan and M.Madheswaran - ‘Experimental verification and stability state space analysis of CLL-T Series Parallel Resonant Converter’ - Journal of Electrical Engineering, Vol.63 (6), pp.365-372, Dec.2012. DOI: 10.2478/v10187-012-0054-2
11. C.Nagarajan and M.Madheswaran - ‘Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis’- Springer, Electrical Engineering, Vol.93 (3), pp.167-178, September 2011. DOI 10.1007/s00202-011-0203-9
12. S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025
13. S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428
14. S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w
15. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.
16. C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.
17. C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.
18. C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007
19. Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721
20. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022
21. T. Kekhashan, M. Abdelhaq, A. S. Al-Shumayleh, N. Huda, I. A. Yaseen,
22. I. A. Ahmed, and A. Akhunzada, “Explainable phishing website detection for secure and sustainable cyber infrastructure,” Scientific Reports, vol. 15, p. 41751, 2025.
23. R. Alzaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara,
24. M. Alyou, A. Al-Shanableh, and S. Almarneh, “Website phishing detection using machine learning techniques,” Journal of Statistics Applications and Probability, vol. 13, no. 1, pp. 119–129, 2024.
25. A. Karim, M. Shabroz, K. Mustofa, S. B. Belhaouari, and S. R. K. Joga, “Phishing detection system through hybrid machine learning based on URL,” IEEE Access, vol. 11, pp. 3605–3682, 2023.
26. A. Sabir, M. A. Babar, R. Gaire, and A. Abuadbba, “Reliability and robustness analysis of machine learning-based phishing URL detectors,” arXiv preprint, arXiv:2005.08454, 2020.
27. Anbazhagan, K. (2025). Next-Generation Enterprise Cloud AI for Healthcare: Secure CNN Pipelines and Privacy Controls. International Journal of Future Innovative Science and Technology (IJFIST), 8(6), 15980.
28. Mathew, A. (2023). Learning Metaverse Powered by Artificial Intelligence. Recent Progress in Science and Technology Vol. 4, 4, 134-141.
29. Dhinakaran, D. (2022). Joe Prathap P. M, Selvaraj D, Arul Kumar D and Murugeshwari B," Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing,". International Journal of Engineering Trends and Technology, 70(3), 284-294.
30. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64.
31. Mathew, A., & Fofang, T. S. I. AI-Driven Fraud Detection: Leveraging Machine Learning for Scam Identification.





