ORIGINAL RESEARCH article
Front. Big Data
Sec. Cybersecurity and Privacy
Transparent and Trustworthy CyberSecurity: An XAI-Integrated Big Data Framework for Phishing Attack Detection
Provisionally accepted- 1The Islamia University of Bahawalpur Pakistan, Bahawalpur, Pakistan
- 2Queen Mary University of London, London, United Kingdom
- 3University of Bolton, Bolton, United Kingdom
- 4Manchester Metropolitan University, Manchester, United Kingdom
- 5University of Staffordshire, Stoke-on-Trent, United Kingdom
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
The exponential growth of heterogeneous, high-velocity CyberSecurity data generated by modern digital infrastructures presents both opportunities and challenges for threat detection, particularly in the face of increasingly sophisticated cyber-attacks. Traditional security tools struggle to process such data effectively, necessitating scalable Big Data Analytics and advanced Machine Learning (ML) techniques. However, the opaque, black box nature of many ML models limits interpretability, trust, and regulatory compliance in high-stakes environments. This study proposes an integrated framework combining Big Data technologies, ML, and Explainable Artificial Intelligence (XAI) to enable accurate, transparent, and real-time phishing attack detection. Leveraging distributed computing and stream processing, the framework efficiently handles large, diverse datasets, while XAI techniques provide human-understandable explanations of model decisions. Experimental evaluation on four publicly available CyberSecurity datasets demonstrates improved detection performance and interpretability, offering actionable insights into malicious URL patterns. The proposed approach advances interpretable, scalable, and trustworthy CyberSecurity analytics, bridging the gap between predictive accuracy and decision transparency.
Keywords: cybersecurity, Cyber-attack detection, machine learning, Explainable artificial intelligence, Security paradigm
Received: 18 Aug 2025; Accepted: 20 Nov 2025.
Copyright: © 2025 Nauman, Usman Akhtar, Gorbani, Hadi Ul Hassan, Fayyaz and Nawaz. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Muhammad A B Fayyaz, m.fayyaz@mmu.ac.uk
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
