ORIGINAL RESEARCH article
Front. Comput. Sci.
Sec. Computer Security
Unveiling Key Features for Phishing Website Detection through Feature Selection
Provisionally accepted- 1Faculty of Information Technology, Zarqa University, Zarqa, Jordan
- 2Faculty of Engineering and Information Technology, Palestine Ahliya University, Bethlehem, Palestine
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
Abstract—Over the past few years, phishing has evolved into an increasingly prevalent form of cybercrime, as more people use the Internet and its applications. Phishing is a type of social engineering that targets users' sensitive or personal information. This paper seeks to achieve two main objectives: first, to identify the most effective classifier for detecting phishing among 40 classifiers representing six learning strategies. Secondly, it aims to identify which feature selection method performs best on websites with phishing datasets. By analyzing three unique datasets related to Phishing and evaluating eight metrics, this study found that Random Forest and Random Tree were superior at identifying phishing websites compared with other approaches. Likewise, GainRatioAttributeEval, along with InfoGainAttributeEval, performed better than the five alternative feature selection methods considered in this study.
Keywords: Classification, Phishing websites, machine learning, Feature Selection, URL analysis
Received: 18 Aug 2025; Accepted: 26 Nov 2025.
Copyright: © 2025 Alazaidah, BaniSalman, Alqawasmi, Abu Zaid, Hazaimeh, Alshraiedeh and Qumsiyeh. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Emma Qumsiyeh
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
