ORIGINAL RESEARCH article
Front. Commun. Netw.
Sec. Security, Privacy and Authentication
Volume 6 - 2025 | doi: 10.3389/frcmn.2025.1587654
MULTIMODAL FRAMEWORK FOR PHISHING ATTACK DETECTION AND MITIGATION THROUGH BEHAVIOR ANALYSIS USING EM-BERT AND SPCA-BASED EAI-SC-LSTM
Provisionally accepted- Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, India
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
The rapid growth of advanced networking causes a significant increase in malicious threats to website data for accessing user information via phishing attacks. For the detection of phishing attacks, many works are developed based on a single data source. But, detecting the phishing attacks of different web sources was not concentrated in any of the existing works.Thus, multiple data sources, including SMS, E-Mail, and URL links, are used in this paper to detect and mitigate phishing attacks. Initially, the input data is collected from the SMS, E-Mail, and URL datasets. The contents and URLs are extracted from the datasets. Next, the textual analysis, including behavioral analysis and structural analysis, is carried out on the extracted URL. Moreover, by utilizing the Entropy Macqueen-based Bidirectional Encoder Representations from Transformers (EM-BERT) algorithm, the contents extracted from SMS and E-Mail datasets and the textually analyzed characters of the URL are transformed into vector form. Simultaneously, the CSS files and images are obtained from the URL dataset. Then, by utilizing Spherical Principal Component Analysis (SPCA), the features are extracted. Further, the optimal features are chosen by using the Cauchy distribution-based Seagull Optimization Algorithm (CSOA). Next, the phishing attack is detected using the Explainable AI SERF CoLU Long Short Term Memory (EAI-SC-LSTM) model. The recognized phishing data and URL are updated to the Blacklist; hence, any new URL, which is already on Blacklist, is reported to the user. As per the experimental outcomes, the proposed EAI-SC-LSTM attains accuracies of 99.627% for SSC, 99.645% for PEC, and 99.541% for WPD in phishing attack detection, which are higher than the existing works. Moreover, the proposed technique detects the phishing attack within a training time of 24417ms (PEC Dataset). Thus, cybersecurity is improved against the evolving phishing threats.
Keywords: short message service (SMS), Java script, Electronic mail (e-mail), User behavior, Uniform resource locator (URL), Cascading style sheets (CSS), Phishing attack, and Artificial
Received: 06 Mar 2025; Accepted: 05 Jun 2025.
Copyright: © 2025 Murhej and Nallasivan. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Mahmoud Murhej, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, India
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.