Open Access Open Access  Restricted Access Subscription or Fee Access

A Non-Content Multilayers Hybrid Machine Learning Web Phishing Detection Model

(*) Corresponding author

Authors' affiliations



Phishing detection is one of the most important services for cyber security. Phishing is an easy to implement attack that depends on social engineering. It is implemented leveraging web, Short Message Service (SMS) and social media. This attack is the backbone of other attacks. In this work, a new web phishing detection algorithm is proposed based on machine learning algorithms. The proposed algorithm is a hybrid machine learning algorithm that consists of two main layers. The first layer is the feature extraction and reduction layer that consists of multiple machine learning algorithms that work in parallel. The second layer consists of one feed-forward neural network layer. Different numbers and types of algorithms can be leveraged in the first layer of the proposed algorithm. The proposed model has been tested with four algorithms in the first layer, namely, K-means, support vector machine, logistic regression and random forest. Four features have been extracted from this layer and fed into the second layer “the neural network layer”. The output of the second layer shows an accuracy that exceeded 99%.
Copyright © 2022 Praise Worthy Prize - All rights reserved.


Web Phishing; Detection; Machine Learning; Hybrid Models; Security

Full Text:



Sakai, Tetsuya, Sijie Tao, Zhaohao Zeng, Yukun Zheng, Jiaxin Mao, Zhumin Chu, Yiqun Liu et al., Overview of the NTCIR-15 we want web with CENTRE (WWW-3) task. (2020) Proceedings of NTCIR-15, pp. 219-234..

Gourley, David, Brian Totty, Marjorie Sayer, Anshu Aggarwal, and Sailu Reddy, HTTP: the definitive guide, O'Reilly Media, Inc., 2002.

Felt, Adrienne Porter, Richard Barnes, April King, Chris Palmer, Chris Bentzel, and Parisa Tabriz, Measuring {HTTPS} adoption on the web, In 26th USENIX security symposium (USENIX security 17), pp. 1323-1338. 2017.

World Wide Web (WWW) Size Report:

Number of Web Users:

Luna, Sergio, and Michael J. Pennock, Social media applications and emergency management: A literature review and research agenda, International Journal of Disaster Risk Reduction 28 (2018): 565-577.

Wang, Lu, Hailiang Yang, Xiaoke Qi, Jun Xu, and Kaishun Wu, ICast: Fine-grained wireless video streaming over Internet of intelligent vehicles, IEEE Internet of Things Journal, 6, no. 1 (2018): 111-123.4

Kaur, Balpreet, and Rishi Raj Sharma, Impact of viral advertising on product promotion: An experimental study, Indian Journal of Marketing 48, no. 6 (2018): 57-68.

Rizky, Robby, and Zaenal Hakim, Analysis and Design of Voip Server (Voice Internet Protocol) using Asterisk in Statistics and Statistical Informatics Communication of Banten Province using Ppdioo Method, In Journal of Physics: Conference Series, vol. 1179, no. 1, p. 012160. IOP Publishing, 2019.

Masoud, Mohammad, Yousef Jaradat, Ahmad Manasrah, and Ismael Jannoud, Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts, Journal of Sensors 2019 (2019).

Masoud, M., Jaradat, Y., Manasrah, A., Taleb, B., Designing of a General Purpose Soft Programmable Logic Controller (PLC) for the Internet of Things (IoT) Era, (2020) International Review of Automatic Control (IREACO), 13 (4), pp. 153-161.

Hanson, Ward A., and Kirthi Kalyanam. Internet marketing and e-commerce.(Student ed.). Thomson/South-Western, 2020.

Sellars, Andrew, Twenty Years of Web Scraping and the Computer Fraud and Abuse Act., BUJ Sci. & Tech. L. 24 (2018): 372.

Phishing Statistics:

Chanti, S., and T. Chithralekha, Classification of anti-phishing solutions, SN Computer Science 1, no. 1 (2020): 1-18.

Bataineh, A., Batayneh, W., Harahsheh, T., Hijazi, K., Alrayes, A., Olimat, M., Bataineh, A., Early Detection of Cardiac Diseases from Electrocardiogram Using Artificial Intelligence Techniques, (2021) International Review on Modelling and Simulations (IREMOS), 14 (2), pp. 128-136.

Bani Yassein, M., Shatnawi, M., Alomari, O., Users Awareness Prediction of Cyber Security Aspects in Twitter Using Machine Learning Algorithms, (2021) International Journal on Communications Antenna and Propagation (IRECAP), 11 (6), pp. 383-392.

Shatnawi, M., Bani Yassein, M., Aljawarneh, S., Alodibat, S., Meqdadi, O., Hmeidi, I., Al Zoubi, O., An Improvement of Neural Network Algorithm for Anomaly Intrusion Detection System, (2020) International Journal on Communications Antenna and Propagation (IRECAP), 10 (2), pp. 84-93.

Masoud, M., Jaradat, Y., Jannoud, I., On Detecting Wi-Fi Unauthorized Access Utilizing Software Define Network (SDN) and Machine Learning Algorithms, (2017) International Review on Computers and Software (IRECOS), 12 (1), pp. 21-29.

Mughaid, Ala, Shadi Al-Zu'bi, Ahmed Al Arjan, Rula Al-Amrat, Rathaa Alajmi, Raed Abu Zitar, and Laith Abualigah, An intelligent cybersecurity system for detecting fake news in social media websites, Soft Computing 26, no. 12 (2022): 5577-5591.

Masoud, Mohammad, Yousef Jaradat, and Amal Q. Ahmad, On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach, In 2016 2nd International Conference on Open Source Software Computing (OSSCOM), pp. 1-6. IEEE, 2016.

Netcraft Ltd., Netcraft extension: Phishing protection and site reports, 2015. Available at:

OpenDNS, PhishTankm, 2015. Available at:

V. Retro, isitPhishing-anti phishing tools and informations, 2015, Available at:

Ardi, Calvin, and John Heidemann, Auntietuna: Personalized content-based phishing detection, In NDSS Usable Security Workshop (USEC). 2016.

Zhang, Yue, Jason I. Hong, and Lorrie F. Cranor, Cantina: a content-based approach to detecting phishing web sites, In Proceedings of the 16th international conference on World Wide Web, pp. 639-648. 2007.

Ozker, Uğur, and Ozgur Koray Sahingoz. Content based phishing detection with machine learning, In 2020 International Conference on Electrical Engineering (ICEE), pp. 1-6. IEEE, 2020.

Zhang, Haijun, Gang Liu, Tommy WS Chow, and Wenyin Liu, Textual and visual content-based anti-phishing: a Bayesian approach, IEEE Transactions on Neural Networks 22, no. 10 (2011): 1532-1546.

Mishra, Sandhya, and Devpriya Soni, Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis, Future Generation Computer Systems 108 (2020): 803-815.

Noh, Norzaidah Binti Md, and M. Nazmi Bin M. Basri, Phishing Website Detection Using Random Forest and Support Vector Machine: A Comparison, In 2021 2nd International Conference on Artificial Intelligence and Data Sciences (AiDAS), pp. 1-5. IEEE, 2021.

Yaseen, Yousef A., Malik Qasaimeh, Raad S. Al-Qassas, and Mustafa Al-Fayoumi, Email Fraud Attack Detection Using Hybrid Machine Learning Approach, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science) 14, no. 5 (2021): 1370-1380.

Vrbančič, Grega, Iztok Fister Jr, and Vili Podgorelec, Datasets for phishing websites detection, Data in Brief 33 (2020): 106438.

Salloum, Said, Tarek Gaber, Sunil Vadera, and Khaled Shaalan, Phishing Website Detection from URLs Using Classical Machine Learning ANN Model, In International Conference on Security and Privacy in Communication Systems, pp. 509-523. Springer, Cham, 2021.

Fitzpatrick, Benjamin, Xinyu Liang, and Jeremy Straub, Fake news and phishing detection using a machine learning trained expert system, arXiv preprint arXiv:2108.08264 (2021).

Sulaiman, Nurul Fadhilah, and Mohd Zalisham Jali, A new SMS spam detection method using both content-based and non content-based features, In Advanced Computer and Communication Engineering Technology, pp. 505-514. Springer, Cham, 2016.

Hu, Yong, Ce Guo, E. W. T. Ngai, Mei Liu, and Shifeng Chen, A scalable intelligent non-content-based spam-filtering framework, Expert systems with applications 37, no. 12 (2010): 8557-8565.

Soon, Gan Kim, Liew Chean Chiang, Chin Kim On, Nordaliela Mohd Rusli, and Tan Soo Fun, Comparison of ensemble simple feedforward neural network and deep learning neural network on phishing detection, In Computational Science and Technology, pp. 595-604. Springer, Singapore, 2020.

Lin, Tian, Daniel E. Capecci, Donovan M. Ellis, Harold A. Rocha, Sandeep Dommaraju, Daniela S. Oliveira, and Natalie C. Ebner, Susceptibility to spear-phishing emails: Effects of internet user demographics and email content, ACM Transactions on Computer-Human Interaction (TOCHI) 26, no. 5 (2019): 1-28.

Albakry, Sara, Kami Vaniea, and Maria K. Wolters, What is this URL's destination? Empirical evaluation of users' URL reading, In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-12. 2020.

Tchakounté, Franklin, Leonel Kanmogne Wabo, and Marcellin Atemkeng, A review of gamification applied to phishing, Preprint (2020).

Arachchilage, Nalin Asanka Gamagedara, and Mumtaz Abdul Hameed, Integrating self-efficacy into a gamified approach to thwart phishing attacks, arXiv preprint arXiv:1706.07748 (2017).

Arachchilage, Nalin Asanka Gamagedara, and Melissa Cole, Designing a mobile game for home computer users to protect against phishing attacks, arXiv preprint arXiv:1602.03929 (2016).


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize