Your new experience awaits. Try the new design now and help us make it even better

ORIGINAL RESEARCH article

Front. Comput. Sci.

Sec. Computer Security

Unveiling Key Features for Phishing Website Detection through Feature Selection

Provisionally accepted
Raed  AlazaidahRaed Alazaidah1Mohammad  BaniSalmanMohammad BaniSalman1Khaled E.  AlqawasmiKhaled E. Alqawasmi1Ali  Abu ZaidAli Abu Zaid1Yousuf  HazaimehYousuf Hazaimeh1Fuad  Sameh AlshraiedehFuad Sameh Alshraiedeh1Emma  QumsiyehEmma Qumsiyeh2*
  • 1Faculty of Information Technology, Zarqa University, Zarqa, Jordan
  • 2Faculty of Engineering and Information Technology, Palestine Ahliya University, Bethlehem, Palestine

The final, formatted version of the article will be published soon.

Abstract—Over the past few years, phishing has evolved into an increasingly prevalent form of cybercrime, as more people use the Internet and its applications. Phishing is a type of social engineering that targets users' sensitive or personal information. This paper seeks to achieve two main objectives: first, to identify the most effective classifier for detecting phishing among 40 classifiers representing six learning strategies. Secondly, it aims to identify which feature selection method performs best on websites with phishing datasets. By analyzing three unique datasets related to Phishing and evaluating eight metrics, this study found that Random Forest and Random Tree were superior at identifying phishing websites compared with other approaches. Likewise, GainRatioAttributeEval, along with InfoGainAttributeEval, performed better than the five alternative feature selection methods considered in this study.

Keywords: Classification, Phishing websites, machine learning, Feature Selection, URL analysis

Received: 18 Aug 2025; Accepted: 26 Nov 2025.

Copyright: © 2025 Alazaidah, BaniSalman, Alqawasmi, Abu Zaid, Hazaimeh, Alshraiedeh and Qumsiyeh. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Emma Qumsiyeh

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.