Detecting Phishing URLs with CNN - Decision Tree Method
DOI:
https://doi.org/10.62951/ijies.v2i2.222Keywords:
Phishing, Detection, URL, Network, LearningAbstract
This research focuses on assessing the efficacy of a method that integrates Convolutional Neural Networks (CNN) with Decision Trees for the detection of phishing URLs. Phishing represents a major cyber threat, where cybercriminals attempt to deceive individuals into disclosing sensitive information via fraudulent websites. As the frequency of phishing attacks continues to rise, there is a pressing need for effective detection and prevention strategies. In this investigation, a dataset comprising both phishing and legitimate URLs was utilized to train a CNN-Decision Tree model. The training phase includes feature extraction from URLs using CNN, which excels at identifying intricate patterns within the data, followed by classification through Decision Trees, recognized for their capacity to deliver straightforward and comprehensible interpretations of classification outcomes. The model's performance was evaluated across nine distinct scenarios to assess its effectiveness under varying conditions. The results indicated that the hybrid CNN-Decision Tree model achieved a precision rate of 94%, a recall of 90%, and an F1-Score of 92%, with an overall accuracy of 93%. These findings suggest that the model is not only proficient in identifying phishing URLs but also maintains a commendable balance between precision and recall. This research highlights that the synergy of CNN and Decision Trees can serve as a potent solution for phishing URL detection, significantly contributing to the advancement of enhanced cybersecurity systems.
References
Al-Sartawi, A. M. A. M. (2020). Information technology governance and cybersecurity at the board level. International Journal of Critical Infrastructures, 16(2), 150–161. https://doi.org/10.1504/ijcis.2020.10029173
APWG. (n.d.). Phishing e-mail reports and phishing site trends. Retrieved from https://www.apwg.org
Barik, K., Misra, S., & Mohan, R. (2025). Web-based phishing URL detection model using deep learning optimization techniques. In-ternational Journal of Data Science and Analytics. https://doi.org/10.1007/s41060-025-00728-9
Barik, K., Misra, S., & Sanz, L. F. (2024). A model for estimating resiliency of AI-based classifiers defending against cyber attacks. In-ternational Journal of Computational Intelligence Systems, 17(1), 1–15. https://doi.org/10.1007/s44196-024-00686-3
Fazeldehkordi, E. (2014). A machine learning approach to phishing detection and defense. Retrieved from https://www.researchgate.net/publication/267156776
Goel, D., & Jain, A. K. (2018). Mobile phishing attacks and defence mechanisms: State of art and open research challenges. Computer Security, 74, 120–133. https://doi.org/10.1016/j.cose.2017.12.006
Greene. (2018). No phishing beyond this point. IEEE Computing, 58(7), 67–75. https://doi.org/10.1109/MC.2018.2701632
Huang, K., Madnick, S. E., & Johnson, S. (2020). Framework for understanding cybersecurity impacts on international trade. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3555341
Ikeda, K., Marshall, A., & Zaharchuk, D. (2019). Agility, skills and cybersecurity: Critical drivers of competitiveness in times of economic uncertainty. Strategic Leadership, 47(3), 40–48. https://doi.org/10.1108/SL-02-2019-0032
Kavya, S., & Sumathi, D. (2025). Staying ahead of phishers: A review of recent advances and emerging methodologies in phishing detec-tion. Artificial Intelligence Review, 58(2), 329–350. https://doi.org/10.1007/s10462-024-11055-z
Maware, C., Parsley, D. M., Huang, K., Swan, G. M., & Akafuah, N. (2023). Moving lab-based in-person training to online delivery: The case of a continuing engineering education program. Journal of Computer Assisted Learning, 39(4), 1167–1183. https://doi.org/10.1111/jcal.12789
Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1(1), 81–106. https://doi.org/10.1007/BF00116251
Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine learning based phishing detection from URLs. Expert Systems with Applications, 117, 345–357. https://doi.org/10.1016/j.eswa.2018.09.029
Yang, P., Zhao, G., & Zeng, P. (2019). Phishing website detection based on multidimensional features driven by deep learning. IEEE Access, 7, 15196–15209. https://doi.org/10.1109/ACCESS.2019.2892066
Lallie, H. S., et al. (2021). Cybersecurity in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, 102248. https://doi.org/10.1016/j.cose.2021.102248
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Information Engineering and Science

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.