PHISHING DETECTION IN ELECTRONIC COMMUNICATION CHANNELS
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1092Keywords:
conversational intelligent assistant, detection, electronic communication, information protection, information security, neural network, phishingAbstract
The article is devoted to increasing the effectiveness of information protection tools in domestic cyberspace by automated detection of phishing in text messages of electronic communication channels. It is shown that phishing remains one of the dominant vectors of cyberattacks, in particular in conditions of active use of social engineering methods and psycho-emotional influence, which significantly complicates its timely detection by traditional signature and statistical methods. It is established that most of the known neural network solutions are characterized by high resource intensity, require the formation of significant volumes of marked-up training data and are insufficiently adapted to the specifics of domestic content, which is characterized by limited marked-up corpora, morphological variability and sensitivity to contextual social engineering influences. To overcome these limitations, the article proposes a method for detecting phishing, which is based on the use of proven dialogical intelligent assistants based on large language models in the mode of formalized dialogical interaction. The method involves automated analysis of text messages by submitting standardized queries, formed taking into account typical features of phishing attacks. A classification of phishing messages by a vector of detection features is proposed. For each type, target query predicates are formed, which provide deterministic and interpretable analysis of the results. The developed method involves preprocessing of the text, formation and submission of queries to dialogic intelligent assistants, aggregation of responses, and assessment of the presence of phishing using the weighted linear convolution mechanism. Experimental studies have shown that the average classification accuracy when using the proposed method is 97.5%, which corresponds to the level of the best known solutions of a similar purpose. At the same time, the implementation of the proposed method does not require resource-intensive training of neural networks, the formation of large volumes of labeled data, and the creation of specialized hardware and software, which ensures the efficiency of creating an effective phishing detection system in domestic electronic communication channels.
Downloads
References
. Aldakheel, E. A., Zakariah, M., Gashgari, G. A., Almarshad, F. A., & Alzahrani, A. I. A. (2023). A deep learning-based innovative technique for phishing detection in modern security with uniform resource locators. Sensors, 23(9), 4403. https://doi.org/10.3390/s23094403
. Altwaijry, N., Al-Turaiki, I., Alotaibi, R., & Alakeel, F. (2024). Advancing phishing email detection: A comparative study of deep learning models. Sensors, 24(7), 2077. https://doi.org/10.3390/s24072077
. Chinta, P. C. R., Moore, C. S., Karaka, L. M., Sakuru, M., Bodepudi, V., & Maka, S. R. (2025). Building an intelligent phishing email detection system using machine learning and feature engineering. European Journal of Applied Science, Engineering and Technology, 3(2), 41–54. https://doi.org/10.59324/ejaset.2025.3(2).04
. Dychka, I. A., Tereikovskyi, I. A., Korovii, O. S., Tereikovska, L. O., & Romankevich, V. O. (2023). Evaluation of the effectiveness of tools for recognizing emotional sentiment of text fragments. Scientific Notes of V. I. Vernadsky Taurida National University. Series: Technical Sciences, 34(73), 3(1), 130–135. https://doi.org/10.32782/2663-5941/2023.3.1/20
. European Union Agency for Cybersecurity. (2020). ENISA threat landscape: Phishing (ISBN 978-92-9204-354-4). Publications Office of the European Union. https://doi.org/10.2824/552242
. Firman, Tukiyat, & Wiharjo, S. (2025). Phishing email classification approach using machine learning algorithms: A literature review. Data: Journal of Information Systems and Management, 3(3), 135–145. https://doi.org/10.61978/data.v3i3
. Harasymchuk, O., Oliarnyk, Y., Nestor, A., & Nakonechyy, T. (2025). Psychological methods of fraud in cyberspace and ways to counter them. Cybersecurity: Education, Science, Technique, 2(30), 511–529. https://doi.org/10.28925/2663-4023.2025.30.990
. Komosny, D. (2025). Phishing detection on webpages in European non-English languages based on machine learning. Scientific Reports, 15, Article 37472. https://doi.org/10.1038/s41598-025-21384-w
. Korchenko, O., Tereikovskyi, I., Dychka, I., Romankevich, V., & Tereikovska, L. (2025). Detection of manipulative component in text messages of mass media in the context of protection of domestic cyberspace. Cybersecurity: Education, Science, Technique, 1(29), 27–40. https://doi.org/10.28925/2663-4023.2025.29.839
. Korchenko, O., Tereikovskyi, I., Ziubina, R., Tereikovska, L., Korystin, O., Tereikovskyi, O., & Karpinskyi, V. (2025). Modular neural network model for biometric authentication of personnel in critical infrastructure facilities based on facial images. Applied Sciences, 15, 2553. https://doi.org/10.3390/app15052553
. Petliak, N., Bezkorovalnyi, Y., & Kupchyk, N. (2024). Analysis of modern methods of detection of phishing e-mails. Herald of Khmelnytskyi National University. Technical Sciences, 341(5), 510–515. https://doi.org/10.31891/2307-5732-2024-341-5-73
. Rangapur, A., Kanakam, T., & Dhanvanthini, P. (2022). Phish-Defence: Phishing detection using deep recurrent neural networks. arXiv. https://doi.org/10.48550/arXiv.2110.13424
. State Cyber Protection Center of the State Service of Special Communications and Information Protection of Ukraine. (2024). Annual report of the vulnerability detection and cyber incident and cyberattack response system: 2024 [Analytical report]. State Service of Special Communications and Information Protection of Ukraine.
. State Cyber Protection Center of the State Service of Special Communications and Information Protection of Ukraine. (2025). System of vulnerability detection and response to cyber incidents and cyberattacks: First half of 2025 [Analytical report]. State Service of Special Communications and Information Protection of Ukraine.
. Tereikovskyi, I. A., Chernyshev, D. O., Korchenko, O. H., Tereikovska, L. O., & Tereikovskyi, O. I. (2022). Procedure for applying neural networks for raster image segmentation. Cybersecurity: Education, Science, Technique, 2(18), 25–38. https://doi.org/10.28925/2663-4023.2022.18.2438
. Tereikovskyi, I., AlShboul, R., Mussiraliyeva, S., Tereikovska, L., Bagitova, K., Tereikovskyi, O., & Hu, Z. (2024). Method for constructing neural network means for recognizing scenes of political extremism in graphic materials of online social networks. International Journal of Computer Network and Information Security, 16(3), 52–69. https://doi.org/10.5815/ijcnis.2024.03.05
. Tyshchenko, V. S. (2023). Analysis of training methods and neural network tools for fake news detection. Cybersecurity: Education, Science, Technique, 4(20), 21–34. https://doi.org/10.28925/2663-4023.2023.20.2034
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Ігор Терейковський, Людмила Терейковська

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.