JETIR2504A41
JETIR2504A41
org (ISSN-2349-5162)
processes user-inputted URLs, emails, and diversity. The study lays the groundwork for creating
messages to classify them as either safe or stronger models with cutting-edge machine learning
malicious based on various features. It employs methods like XGBoost, SVM, and decision trees.
advanced feature extraction methods to improve Arathi Krishna V et al. (2021) [2] Using neural
accuracy and minimize false positives. PHISHNET networks, random forest, and SVM classifiers, Arathi
is designed to be scalable, allowing continuous Krishna's paper investigates phishing detection and
learning and adaptation to new phishing achieves 90.70% accuracy in URL analysis. The study
techniquesThe project's goal is to give users, highlights the necessity of using a variety of machine
companies, and cybersecurity experts a dependable learning algorithms in order to detect different types of
and efficient way to counteract phishing threats. phishing attacks. It draws attention to the ways in which
various classifiers enhance detection precision and
Because of its intuitive interface, PHISHNET lower false positives. According to the research,
makes it simple to detect phishing attempts without integrating different models improves the capacity to
the need for technical knowledge. To keep ahead of assess and counteract various phishing threat types.
new phishing techniques, it makes use of real-time
data analysis and regularly updates its detection Taun Dung Pham and associates (2021) [3] They
models. The system is a flexible tool for people and perform two URL classifiers, LSTM and GRU, to
organizations looking for improved cybersecurity provide comparative results after integrating the
because it can be integrated into a variety of generated phishing URL data into the current URL
platforms. PHISHNET offers a proactive method of database. They suggest using the available phishing
detecting and reducing phishing threats by URL data to train WGAN-GP, a GA network, to
employing machine learning-driven threat generate malicious URLs. Using a machine learning
intelligence, guaranteeing a safer online experience approach, it is necessary to identify the state-of-the-art
for users. and choose the best machine learning algorithm.
Any users who unintentionally respond to Chapla et al., Happy (2019) [4] This model
misleading messages, open malicious emails, or incorporates the features that have been extracted from
click on fraudulent links risk financial losses and both phishing and legitimate URLs. It is necessary to
security breaches. Attackers employ advanced identify useful lexical features. Our system receives
techniques to produce phony emails and websites real, accurate results.
that closely mimic authentic sources, making it
challenging for users to discern between authentic III. SYSTEM ARCHITECTURE
and fraudulent content. The necessity for an
intelligent system that can successfully identify and
stop phishing attempts before they cause harm is
highlighted by this growing threat. 1. User Interface (UI)
II. LITERATURE SURVEY Description: The front-end where users interact with
PHISHNET to input data and view results.
Manuel Sánchez-Paniagua and associates (2022)
[1] A Logistic Regression model with TF-IDF Components:
feature extraction is presented in the paper by
Manuel Sánchez-Paniagua et al. (2022), and it Web portal (main interface for interaction)
achieves 96.50% accuracy on a dataset of login Real-time phishing detection results
URLs for phishing detection. Although useful, the Risk level visualization (e.g., safe, suspicious,
study emphasizes that TF-IDF and Logistic dangerous)
Regression alone are not enough to identify Upload/input options for URL, email content, or
changing phishing tactics. To increase accuracy and SMS text
lower false positives, the authors advise combining
several machine learning algorithms. In order to
improve phishing detection, they also stress the
significance of feature engineering and dataset
JETIR2504A40 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org k2
© 2025 JETIR April 2025, Volume 12, Issue 4 www.jetir.org (ISSN-2349-5162)
Description: The core of phishing detection using Website Blocking: Displays strong warnings when
machine learning algorithms. a URL is flagged
Email/SMS Alerts: Textual warning messages
Components: indicating the threat level
ML Model Deployment:
Direct method calls to prediction functions Threat feed integration (via direct scripts or file
ingestion)
Detection Modules: Scheduled retraining/updating of models
Components:
Dataset versioning
Fig.1. Project Architecture
4. Blocking & Alerting Mechanism
IV. System Flow
Description: Prevents or warns users about
malicious content.
Workflow and Data Flow
The system workflow follows a structured approach to
travel planning:
1. User Input Stage May include suggestions (e.g., "Do not click",
"Report this message").
User provides:
2. Preprocessing Stage
VI.RESULTS
VII. CONCLUSION
Fig.5. Email Detection
By identifying and stopping phishing attempts on
websites, emails, and SMS messages, our project
seeks to improve internet security.
We make it easier for users and enhance their [2] Edward Wijaya, Gracella Noveliora, Kharisma Dwi
overall online safety by offering a single Utami , Rojali, Ghinaa Zain Nabiilah ,Spam Detection
platform for phishing detection and prevention. in Short Message Service (SMS) Using Naïve Bayes,
SVM, LSTM, and CNN , 2023 10th International
The system offers real-time phishing detection, Conference on Information Technology, Computer and
assisting users in making well-informed Electrical Engineering (ICITACEE) .
security decisions. [3] Ammar Odeh , Ismail Keshta , Eman Abdelfattah,
The incorporation of machine learning Machine Learning Techniques for Detection of
techniques improves detection accuracy and Website Phishing: A Review for Promises and
lowers false positives Challenges , 2021 IEEE 11th Annual Computing and
Communication Workshop and Conference (CCWC).
All things considered, by assisting users in [4] V Dharani, Divyashree Hegde, Mohana, Spam
making wise decisions and avoiding phishing SMS (or) Email Detection and Classification using
scams, our project makes the internet a safer Machine Learning , 2023 5th International Conference
place. on Smart Systems and Inventive Technology (ICSSIT).
[5] Kerin Pithawala, Sakshi Jagtap and Preksha
Cholachgud , Detecting Phishing of Short Uniform
Resource Locators using classification techniques ,
VIII. FUTURE ENHANCEMENTS 2021 12th International Conference on Computing
Communication and Networking Technologies
Improved Machine Learning Models: By (ICCCNT).
combining more sophisticated deep learning
and natural language processing methods, the
detection accuracy is increased.
IX. REFERENCES