Cover
Vol. 22 No. 1 (2026)

Published: June 15, 2026

Pages: 344-362

Original Article

Unraveling Phishing Attacks and Countermeasures: A Comprehensive Review

Abstract

Recent advancements in communication and wireless technologies have greatly increased the number of internet users. These users often share personal information online, making it vulnerable to attackers. Phishing, a common type of online fraud, involves tricking people into giving their personal information through spam or other deceptive methods. Even though this threat has been around for a long time, it is still very active and successful. Attackers have improved their methods over the years to make their attacks more convincing and effective. Therefore, it is important to carefully study this type of attack to raise awareness among both users and cybersecurity researchers. This review paper explains the basics, types, and methods of phishing and presents a unified attack lifecycle framework to provide users and researchers with a clear understanding of phishing. Additionally, anti-phishing methods are thoroughly analyzed to determine their strengths and weaknesses. Researchers use different strategies to develop anti-phishing solutions, including blacklisting, whitelisting, heuristics, machine learning, and deep learning techniques. To help readers choose the best anti-phishing solution, research studies using these strategies are categorized, evaluated, and compared using specific criteria to show their strengths and weaknesses. Furthermore, the datasets used to develop anti-phishing models are discussed and reviewed. Finally, this paper provides a detailed overview of current phishing challenges and suggests future research directions in this area.

References

  1. K. Haan, “Top website statistics for 2024,” 2024. Available online: https://www.forbes. com/advisor/business/software/ website-statistics/.
  2. Statista, “Number of internet and social media users worldwide as of july 2024,” 2023. Available online: https://www.statista.com/statistics/ 617136/digital-population-worldwide.
  3. P. Patel, D. M. Sarno, J. E. Lewis, M. Shoss, M. B. Neider, and C. J. Bohil, “Perceptual representation of spam and phishing emails,” Applied Cognitive Psychology, vol. 33, no. 6, pp. 1296–1304, 2019.
  4. J. A. Chaudhry, S. A. Chaudhry, and R. G. Rittenhouse, “Phishing attacks and defenses,” International Journal of Security and Its Applications, vol. 10, no. 1, pp. 247– 256, 2016.
  5. C. I. Internet Crime Complaint, “2023 internet crime report,” 2023. Available online: https://www.ic3.gov/Media/PDF/ AnnualReport/2023_IC3Report.pdf [Accessed on 27 June 2024].
  6. Kaspersky, “The number of phishing attacks doubled to reach over 500 million in 2022,” 2023. Available online: https://www.kaspersky.com/about/pressreleases/ the-number-of-phishing-attacks-doubled -toreach- over-500-million-in-2022 [Accessed: 12 Feb. 2023].
  7. G. Anti-Phishing Working, “Phishing activity trends reports,” 2023. Available online: https://apwg. org/trendsreports [Accessed on 13 December 2023].
  8. Y. Al-Hamar, H. Kolivand, M. Tajdini, T. Saba, and V. Ramachandran, “Enterprise credential spearphishing attack detection,” Computers & Electrical Engineering, vol. 94, p. 107363, 2021.
  9. R. Kalni˜nˇs, J. Puri˜nˇs, and G. Alksnis, “Security evaluation of wireless network access points,” Applied Computer Systems, vol. 21, no. 1, pp. 38–45, 2017.
  10. N. N. Pokrovskaia and S. O. Snisarenko, “Social engineering and digital technologies for the security of the social capital’s development,” in 2017 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), pp. 16–18, IEEE, 2017.
  11. M. A. Chargo, “You’ve been hacked: How to better incentivize corporations to protect consumers’ data,” Transactions: Tennessee Journal of Business Law, vol. 20, p. 115, 2018.
  12. G. J. W. Kathrine, P. M. Praise, A. A. Rose, and E. C. Kalaivani, “Variants of phishing attacks and their detection techniques,” in 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 255–259, IEEE, 2019.
  13. A. A. Zuraiq and M. Alkasassbeh, “Phishing detection approaches,” in 2019 2nd International Conference on New Trends in Computing Sciences (ICTCS), pp. 1–6, IEEE, 2019.
  14. Cisco, “What are the most common cyberattacks,” 2023. Available online: www.cisco.com/c/en/us/products/ security/commoncyberattacks.html# $sim$types-of-cyber-attacks.
  15. B. Gorman, “Different types of hackers: White hat, black hat, gray hat, and more,” 2023. Available online: https://www.avg.com/en/signal/types-of-hackers.
  16. Kaspersky, “I’m a phishing victim! what do i do now?,” 2023. Available online: https: //usa.kaspersky.com/resource-center/ threats/handling-phishing-attacks.
  17. NCSC, “Understanding vulnerabilities,” 2023. Available online: https:// www.ncsc.gov.uk/information/ understanding-vulnerabilities.
  18. U. A. Butt, R. Amin, H. Aldabbas, S. Mohan, B. Alouffi, and A. Ahmadian, “Cloud-based email phishing attack using machine and deep learning algorithm,” Complex & Intelligent Systems, vol. 9, no. 3, pp. 3043–3070, 2023.
  19. A. K. Jain and B. Gupta, “A survey of phishing attack techniques, defence mechanisms and open research challenges,” Enterprise Information Systems, vol. 16, no. 4, pp. 527–565, 2022.
  20. J. Rastenis, S. Ramanauskait¯e, J. Janulevi¯cius, A. Cˇ enys, A. Slotkiene¯, and K. Pakrijauskas, “E-mailbased phishing attack taxonomy,” Applied Sciences, vol. 10, no. 7, p. 2363, 2020.
  21. F. Maggi, “Are the con artists back? a preliminary analysis of modern phone frauds,” in 2010 10th IEEE International Conference on Computer and Information Technology, pp. 824–831, IEEE, 2010.
  22. S. Gupta, P. Gupta, M. Ahamad, and P. Kumaraguru, “Abusing phone numbers and cross-application features for crafting targeted attacks,” arXiv preprint arXiv:1512.07330, 2015.
  23. S. Yadav and B. Bohra, “A review on recent phishing attacks in internet,” in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1312–1315, IEEE, 2015.
  24. R. McCurdy, “The biggest phishing breaches of 2022 and how to avoid them for 2023,” 2022. Available online: https://securityboulevard.com/2022/11/thebiggest- phishing-breaches-of-2022-and-how-toavoid- them-for-2023.
  25. Fortinet, “19 types of phishing attacks,” 2023. Available online: https://www.fortinet. com/resources/cyberglossary/ types-of-phishing-attacks.
  26. F. times, “Statistic,” 2023. Available online: https://firewalltimes.com/category/ statistic.
  27. A. R. Mahmood and S. M. Hameed, “Review of smishing detection via machine learning,” Iraqi Journal of Science, vol. 64, no. 8, pp. 4244–4259, 2023.
  28. Z. H. Ali, H. M. Salman, and A. H. Harif, “Sms spam detection using multiple linear regression and extreme learning machines,” Iraqi Journal of Science, vol. 64, no. 10, pp. 6342–6351, 2023.
  29. Helpnetsecurity, “Phishing attacks hit all-time high in december 2021,” 2022. Available online: https: //www.helpnetsecurity.com/2022/03/ 03/phishing-attacks-december-2021.
  30. B. Parmar, “Protecting against spear-phishing,” Computer Fraud & Security, vol. 2012, no. 1, pp. 8–11, 2012.
  31. X. Liu, H. Lu, and A. Nayak, “A spam transformer model for sms spam detection,” IEEE Access, vol. 9, pp. 80253–80263, 2021.
  32. G. Sonowal and K. Kuppusamy, “Phidma–a phishing detection model with multi-filter approach,” Journal of King Saud University-Computer and Information Sciences, vol. 32, no. 1, pp. 99–112, 2020.
  33. D. Goel and A. K. Jain, “Mobile phishing attacks and defence mechanisms: State of art and open research challenges,” Computers & Security, vol. 73, pp. 519– 544, 2018.
  34. K. L. Chiew, K. S. C. Yong, and C. L. Tan, “A survey of phishing attacks: Their types, vectors and technical approaches,” Expert Systems with Applications, vol. 106, pp. 1–20, 2018.
  35. Z. Dou, I. Khalil, A. Khreishah, A. Al-Fuqaha, and M. Guizani, “Systematization of knowledge (sok): A systematic review of software-based web phishing detection,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2797–2819, 2017.
  36. Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for detecting phishing webpages,” Computers & Security, vol. 84, pp. 256–275, 2019.
  37. B. B. Gupta, A. Tewari, A. K. Jain, and D. P. Agrawal, “Fighting against phishing attacks: state of the art and future challenges,” Neural Computing and Applications, vol. 28, pp. 3629–3654, 2017.
  38. A. Safi and S. Singh, “A systematic literature review on phishing website detection techniques,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 2, pp. 590–611, 2023.
  39. A. K. Jain and B. B. Gupta, “A novel approach to protect against phishing attacks at client side using autoupdated white-list,” EURASIP Journal on Information Security, vol. 2016, pp. 1–11, 2016.
  40. Y. Cao, W. Han, and Y. Le, “Anti-phishing based on automated individual white-list,” in Proceedings of the 4th ACM Workshop on Digital Identity Management (DIM ’08), (New York, NY, USA), pp. 51–60, Association for Computing Machinery, 2008.
  41. L. Yang, J. Zhang, X. Wang, Z. Li, Z. Li, and Y. He, “An improved elm-based and data preprocessing integrated approach for phishing detection considering comprehensive features,” Expert Systems with Applications, vol. 165, p. 113863, 2021.
  42. A. Y. Fu, L. Wenyin, and X. Deng, “Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (emd),” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 301–311, 2006.
  43. K.-T. Chen, J.-Y. Chen, C.-R. Huang, and C.-S. Chen, “Fighting phishing with discriminative keypoint features,” IEEE Internet Computing, vol. 13, no. 3, pp. 56– 63, 2009.
  44. Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with the combination of local and global features,” in 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 189–196, IEEE, 2014.
  45. A. K. Jain and B. B. Gupta, “Two-level authentication approach to protect from phishing attacks in real time,” Journal of Ambient Intelligence and Humanized Computing, vol. 9, pp. 1783–1796, 2018.
  46. K. L. Chiew, C. L. Tan, K.Wong, K. S. Yong, andW. K. Tiong, “A new hybrid ensemble feature selection framework for machine learning-based phishing detection system,” Information Sciences, vol. 484, pp. 153–166, 2019.
  47. N. M. Shekokar, C. Shah, M. Mahajan, and S. Rachh, “An ideal approach for detection and prevention of phishing attacks,” Procedia Computer Science, vol. 49, pp. 82–91, 2015.
  48. Z. Liu, B. Yang, J. An, and C. Huang, “Similarity evaluation of graphic design based on deep visual saliency features,” The Journal of Supercomputing, vol. 79, no. 18, pp. 21346–21367, 2023.
  49. A. K. Jain and B. B. Gupta, “Phishing detection: analysis of visual similarity based approaches,” Security and Communication Networks, vol. 2017, no. 1, p. 5421046, 2017.
  50. A. Abunadi, O. Akanbi, and A. Zainal, “Feature extraction process: A phishing detection approach,” in 2013 13th International Conference on Intelligent Systems Design and Applications, (Selangor, Malaysia), pp. 331–335, 2013.
  51. R. M. Mohammad, F. Thabtah, and L. McCluskey, “An assessment of features related to phishing websites using an automated technique,” in 2012 International Conference for Internet Technology and Secured Transactions, (London, UK), pp. 492–497, 2012.
  52. R. M. Mohammad, F. Thabtah, and L. McCluskey, “Predicting phishing websites based on self-structuring neural network,” Neural Computing and Applications, vol. 25, pp. 443–458, 2014.
  53. L. A. T. Nguyen and H. K. Nguyen, “Developing an efficient fuzzy model for phishing identification,” in 2015 10th Asian Control Conference (ASCC), (Kota Kinabalu, Malaysia), pp. 1–6, IEEE, 2015.
  54. J. Solanki and R. G. Vaishnav, “Website phishing detection using heuristic based approach,” in Proceedings of the Third International Conference on Advances in Computing, Electronics and Electrical Technology, pp. 87–92, 2015.
  55. P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, “Phishnet: predictive blacklisting to detect phishing attacks,” in 2010 Proceedings IEEE INFOCOM, (IEEE), pp. 1–5, 2010.
  56. H. Shahriar and M. Zulkernine, “Trustworthiness testing of phishing websites: A behavior model-based approach,” Future Generation Computer Systems, vol. 28, no. 8, pp. 1258–1271, 2012.
  57. R. S. Rao and S. T. Ali, “Phishshield: a desktop application to detect phishing webpages through heuristic approach,” Procedia Computer Science, vol. 54, pp. 147–156, 2015.
  58. Y. Mourtaji, M. Bouhorma, D. Alghazzawi, G. Aldabbagh, and A. Alghamdi, “Hybrid rule-based solution for phishing url detection using convolutional neural network,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–24, 2021.
  59. B. Mahesh, “Machine learning algorithms-a review,” International Journal of Science and Research (IJSR), vol. 9, no. 1, pp. 381–386, 2020.
  60. T. H. Yousiaf and M. S. Al-Tamimi, “The role of artificial intelligence in diagnosing heart disease in humans: A review,” Journal of Applied Engineering and Technological Science (JAETS), vol. 5, no. 1, pp. 321–338, 2023.
  61. M. Moghimi and A. Y. Varjani, “New rule-based phishing detection method,” Expert Systems with Applications, vol. 53, pp. 231–242, 2016.
  62. H. Shirazi, Unbiased phishing detection using domain name based features. PhD thesis, Colorado State University, Fort Collins, CO, USA, 2018.
  63. M. Pratiwi, T. Lorosae, and F. Wibowo, “Phishing site detection analysis using artificial neural network,” Journal of Physics: Conference Series, vol. 1140, no. 1, p. 012048, 2018.
  64. M. Babagoli, M. P. Aghababa, and V. Solouk, “Heuristic nonlinear regression strategy for detecting phishing websites,” Soft Computing, vol. 23, no. 12, pp. 4315– 4327, 2019.
  65. G. K. Kulatilleke, “Challenges and complexities in machine learning based credit card fraud detection,” arXiv preprint, vol. arXiv:2208.10943, 2022.
  66. M. Al-Sarem, F. Saeed, Z. Al-Mekhlafi, B. Mohammed, T. Al-Hadhrami, M. Alshammari, A. Alreshidi, and T. Alshammari, “An optimized stacking ensemble model for phishing websites detection,” Electronics, vol. 10, no. 11, p. 1285, 2021.
  67. H. Zuhair, A. Selamat, and M. Salleh, “Feature selection for phishing detection: a review of research,” International Journal of Intelligent Systems Technologies and Applications, vol. 15, no. 2, pp. 147–162, 2016.
  68. A. A. Ubing, S. K. B. Jasmi, A. Abdullah, N. Jhanjhi, and M. Supramaniam, “Phishing website detection: An improved accuracy through feature selection and ensemble learning,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 1, 2019.
  69. A. Jain and B. Gupta, “Phish-safe: Url features-based phishing detection system using machine learning,” in Cyber Security (M. Bokhari, N. Agrawal, and D. Saini, eds.), vol. 729 of Advances in Intelligent Systems and Computing, Singapore: Springer, 2018.
  70. O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from urls,” Expert Systems with Applications, vol. 117, pp. 345–357, 2019.
  71. A. Zamir, H. U. Khan, T. Iqbal, N. Yousaf, F. Aslam, A. Anjum, and M. Hamdani, “Phishing web site detection using diverse machine learning algorithms,” The Electronic Library, vol. 38, no. 1, pp. 65–80, 2020.
  72. M. Zabihimayvan and D. Doran, “Fuzzy rough set feature selection to enhance phishing attack detection,” in 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (New Orleans, LA, USA), pp. 1–6, 2019.
  73. A. Odeh, I. Keshta, and E. Abdelfattah, “Phiboost-a novel phishing detection model using adaptive boosting approach,” Jordanian Journal of Computers and Information Technology (JJCIT), vol. 7, no. 01, 2021.
  74. A. Suryan, C. Kumar, M. Mehta, R. Juneja, and A. Sinha, “Learning model for phishing website detection,” EAI Endorsed Transactions on Scalable Information Systems, vol. 7, no. 27, pp. e6–e6, 2020.
  75. J. Kumar, A. Santhanavijayan, B. Janet, B. Rajendran, and B. Bindhumadhava, “Phishing website classification and detection using machine learning,” in 2020 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–6, IEEE, 2020.
  76. M. N. Alam, D. Sarma, F. F. Lima, I. Saha, and S. Hossain, “Phishing attacks detection using machine learning approach,” in 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1173–1179, IEEE, 2020.
  77. S. R. Sharma, R. Parthasarathy, and P. B. Honnavalli, “A feature selection comparative study for web phishing datasets,” in 2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), pp. 1–6, IEEE, 2020.
  78. A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil, and K. Kifayat, “A comprehensive survey of ai-enabled phishing attacks detection techniques,” Telecommunication Systems, vol. 76, pp. 139–154, 2021.
  79. A. Basit, M. Zafar, A. R. Javed, and Z. Jalil, “A novel ensemble machine learning method to detect phishing attack,” in 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1–5, IEEE, 2020.
  80. M. G. HR and A. MV, “Development of anti-phishing browser based on random forest and rule of extraction framework,” Cybersecurity, vol. 3, no. 1, pp. 1–14, 2020.
  81. G. Harinahalli Lokesh and G. BoreGowda, “Phishing website detection based on effective machine learning approach,” Journal of Cyber Security Technology, vol. 5, no. 1, pp. 1–14, 2021.
  82. M. Sabahno and F. Safara, “Isho: improved spotted hyena optimization algorithm for phishing website detection,” Multimedia Tools and Applications, vol. 81, no. 24, pp. 34677–34696, 2022.
  83. V. K. Nadar, B. Patel, V. Devmane, and U. Bhave, “Detection of phishing websites using machine learning approach,” in 2021 2nd Global Conference for Advancement in Technology (GCAT), pp. 1–8, IEEE, 2021.
  84. Q. A. Al-Haija and A. Al Badawi, “Url-based phishing websites detection via machine learning,” in 2021 International Conference on Data Analytics for Business and Industry (ICDABI), pp. 644–649, IEEE, 2021.
  85. A. Ramana, K. L. Rao, and R. S. Rao, “Stop-phish: an intelligent phishing detection method using feature selection ensemble,” Social Network Analysis and Mining, vol. 11, no. 1, p. 110, 2021.
  86. A. Lakshmanarao, P. S. P. Rao, and M. B. Krishna, “Phishing website detection using novel machine learning fusion approach,” in 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 1164–1169, IEEE, 2021.
  87. A. Hannousse and S. Yahiouche, “Towards benchmark datasets for machine learning based website phishing detection: An experimental study,” Engineering Applications of Artificial Intelligence, vol. 104, p. 104347, 2021.
  88. T. A. Assegie, “K-nearest neighbor based url identification model for phishing attack detection,” Indian Journal of Artificial Intelligence and Neural Networking, vol. 1, pp. 18–21, 2021.
  89. R. Chiramdasu, G. Srivastava, S. Bhattacharya, P. K. Reddy, and T. R. Gadekallu, “Malicious url detection using logistic regression,” in 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), pp. 1–6, IEEE, 2021.
  90. A. Mughaid, S. AlZu’bi, A. Hnaif, S. Taamneh, A. Alnajjar, and E. A. Elsoud, “An intelligent cyber security phishing detection system using deep learning techniques,” Cluster Computing, vol. 25, no. 6, pp. 3819– 3828, 2022.
  91. J. Gu and H. Xu, “An ensemble method for phishing websites detection based on xgboost,” in 2022 14th International Conference on Computer Research and Development (ICCRD), pp. 214–219, IEEE, 2022.
  92. M. Atari and A. Al-Mousa, “A machine-learning based approach for detecting phishing urls,” in 2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 82–88, IEEE, 2022.
  93. N. Puri, P. Saggar, A. Kaur, and P. Garg, “Application of ensemble machine learning models for phishing detection on web networks,” in 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT), pp. 296–303, IEEE, 2022.
  94. B. Alotaibi and M. Alotaibi, “Consensus and majority vote feature selection methods and a detection technique for web phishing,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 717– 727, 2021.
  95. S. Das Guptta, K. T. Shahriar, H. Alqahtani, D. Alsalman, and I. H. Sarker, “Modeling hybrid featurebased phishing websites detection using machine learning techniques,” Annals of Data Science, pp. 1–26, 2022.
  96. F. Hossain, L. Islam, and M. N. Uddin, “Phishrescue: A stacked ensemble model to identify phishing website using lexical features,” in 2022 5th International Conference of Computer and Informatics Engineering (IC2IE), pp. 342–347, IEEE, 2022.
  97. L. R. Kalabarige, R. S. Rao, A. Abraham, and L. A. Gabralla, “Multilayer stacked ensemble learning model to detect phishing websites,” IEEE Access, vol. 10, pp. 79543–79552, 2022.
  98. S. R. Abdul Samad and et al., “Analysis of the performance impact of fine-tuned machine learning model for phishing url detection,” Electronics, vol. 12, no. 7, p. 1642, 2023.
  99. Y. Guo, Y. Liu, A. Oerlemans, S. Lao, S. Wu, and M. S. Lew, “Deep learning for visual understanding: A review,” Neurocomputing, vol. 187, pp. 27–48, 2016.
  100. W. Chen, W. Zhang, and Y. Su, “Phishing detection research based on lstm recurrent neural network,” in Data Science (Q. Zhou, Y. Gan, W. Jing, X. Song, Y. Wang, and Z. Lu, eds.), vol. 901 of Communications in Computer and Information Science, Springer, 2018.
  101. M. Nivaashini and R. Soundariya, “Deep stacked autoencoder based feature representation for phishing urls detection,” Journal of Advanced Research in Dynamical and Control Systems, vol. 9, no. 6, pp. 904–916, 2017.
  102. H. Le, Q. Pham, D. Sahoo, and S. C. Hoi, “Urlnet: Learning a url representation with deep learning for malicious url detection,” arXiv:1802.03162, 2018.
  103. H. Shirazi, K. Haefner, and I. Ray, “Improving autodetection of phishing websites using fresh-phish framework,” Int. J. Multimed. Data Eng. Manag., vol. 9, no. 1, pp. 1–14, 2018.
  104. P. Yi, Y. Guan, F. Zou, Y. Yao, W. Wang, and T. Zhu, “Web phishing detection using a deep learning framework,” Wirel. Commun. Mobile Comput., vol. 2018, p. 4678746, 2018.
  105. W. Wang, F. Zhang, X. Luo, and S. Zhang, “Pdrcnn: Precise phishing detection with recurrent convolutional neural networks,” Sec. Commun. Networks, vol. 2019, pp. 1–15, 2019.
  106. A. R. Mahmood and S. M. Hameed, “A smishing detection method based on sms contents analysis and url inspection using google engine and virustotal,” Iraqi J. Sci., pp. 6276–6291, 2023.
  107. F. Castano, E. F. Fern´andez, R. Alaiz-Rodr´ıguez, and E. Alegre, “Phikita: Phishing kit attacks dataset for phishing websites identification,” IEEE Access, 2023.
  108. S. Singhal, U. Chawla, and R. Shorey, “Machine learning & concept drift based approach for malicious website detection,” in 2020 Int. Conf. COMmunication Syst. NETworkS (COMSNETS), pp. 582–585, IEEE, 2020.
  109. M. Somesha, A. R. Pais, R. S. Rao, and V. S. Rathour, “Efficient deep learning techniques for the detection of phishing websites,” S¯adhan¯a, vol. 45, pp. 1–18, 2020.
  110. L. Lakshmi, M. P. Reddy, C. Santhaiah, and U. J. Reddy, “Smart phishing detection in web pages using supervised deep learning classification and optimization technique adam,” Wirel. Pers. Commun., vol. 118, no. 4, pp. 3549–3564, 2021.
  111. A. K. Dutta, “Detecting phishing websites using machine learning technique,” PloS One, vol. 16, no. 10, p. e0258361, 2021.
  112. M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Intelligent phishing detection scheme using deep learning algorithms,” Journal of Enterprise Information Management, vol. 36, no. 3, pp. 747–766, 2023.
  113. Y. Wei and Y. Sekiya, “Sufficiency of ensemble machine learning methods for phishing websites detection,” IEEE Access, vol. 10, pp. 124103–124113, 2022.
  114. A. Chawla, “Phishing website analysis and detection using machine learning,” International Journal of Intelligent Systems and Applications in Engineering, vol. 10, no. 1, pp. 10–16, 2022.
  115. R. Alabdan, “Phishing attacks survey: Types, vectors, and technical approaches,” Future internet, vol. 12, no. 10, p. 168, 2020.
  116. S. Tiwari, “Phishing dataset for machine learning,” 2021. Available online: https://www. kaggle.com/datasets/shashwatwork/ phishing-dataset-for-machine-learning.
  117. I. UC, “Browse datasets,” 2024. Available online: https://archive.ics.uci.edu/ datasets.
  118. Mendeley, “Mendeley data,” 2023. Available online: https://data.mendeley.com/ research-data/?type=DATASET&search= phishing.
  119. G. Vrbanˇciˇc, I. Fister Jr, and V. Podgorelec, “Datasets for phishing websites detection,” Data in Brief, vol. 33, p. 106438, 2020.
  120. Y. Wei and Y. Sekiya, “Feature selection approach for phishing detection based on machine learning,” in Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 (H. Ragab Hassen and H. Batatia, eds.), vol. 378 of Lecture Notes in Networks and Systems, pp. 61–70, Cham: Springer, 2022.