DETECTING PHISHING URLS BASED ON HEURISTIC RULES
DOI:
https://doi.org/10.28925/2663-4023.2025.28.830Keywords:
phishing, phishing sites, heuristic rules, classification, legitimate URL, rule effectivenessAbstract
The growing number of cyber threats, including phishing attacks, requires the development of effective phishing detection methods. Phishing is one of the most widespread and dangerous forms of cybercrime aimed at gaining access to confidential user information by manipulating their trust. The methodology of social engineering attacks is evolving rapidly, which creates challenges for cybersecurity professionals. This study discusses a rule-based heuristic approach to detecting phishing URLs that analyses various characteristics of web addresses, such as atypical link structure, suspicious characters, or incorrect word sequences in domain names, to identify potential threats. A mind map, as a visualisation tool, provides a structured and logically ordered approach to analysing phishing website detection methods. It clearly demonstrates the relationships between various rules aimed at identifying suspicious behaviour of web resources, and also allows you to clearly trace the classification of characteristics inherent in phishing attacks. This map summarises the key features used to analyse URLs, allowing for a structured presentation of the criteria for assessing a potential threat. Having a clear classification of heuristic detection rules, the accuracy of identifying phishing websites is significantly improved, protecting users from possible attacks. The study evaluates the effectiveness of individual heuristic rules and their combinations, which gives an idea of their applicability to automated phishing detection systems. For this purpose, we use key metrics that determine the quality of the algorithm and its ability to distinguish between phishing and legitimate websites, namely reliability, true positive rate, false positive rate, accuracy, and F-1 score. The results demonstrate the feasibility of heuristic detection as a simple, effective and understandable alternative to complex machine learning models.
Downloads
References
Mashtalir, V. et al. (2024). Kiberborot'ba v umovakh zbroinoho protystoiannia: analiz, stratehii ta vyklyky. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony, 49(1), 93–104. https://doi.org/10.33099/2311-7249/2024-49-1-93-104
Alkhalil, Z. та ін. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3. https://doi.org/10.3389/fcomp.2021.563060
Marchal, S., Saari, K., Singh, N., & Asokan, N. (2016). Know your phish: Novel techniques for detecting phishing sites and their targets. In Proceedings of the IEEE 36th International Conference on Distributed Computing Systems (ICDCS), 323–333. https://doi.org/10.48550/arXiv.1510.06501
Buchyk, S., Shutenko, D., & Toliupa, S. (2022). Phishing Attacks Detection. In IX International Scientific Conference “Information Technology and Implementation" (IT&I-2022), Workshop Proceedings, 193–201. https://ceur-ws.org/Vol-3384/Short_7.pdf
What is phishing? | Microsoft security suite. (n.d.). Microsoft. https://www.microsoft.com/uk-ua/security/business/security-101/what-is-phishing
Phishing, Technique T1566 - Enterprise | MITRE ATT&CK®. (n.d.). MITRE ATT&CK®. https://attack.mitre.org/techniques/T1566/
Alabdan, R. (2020). Phishing attacks survey: types, vectors, and technical approaches. Future Internet, 12(10), 168. https://doi.org/10.3390/fi12100168
Mohammad, R., Thabtah, F., & Mccluskey, T. (2012). An assessment of features related to phishing websites using an automated technique. In 2012 International Conference on Information and Computer Science (ICICS), 492–497. https://ieeexplore.ieee.org/document/6470857
Phishtank. (n.d.). https://www.phishtank.com
Ozcan, A., et al. (2021). A hybrid DNN–LSTM model for detecting phishing URLs. Neural Computing and Applications. https://doi.org/10.1007/s00521-021-06401-z
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Сергій Бучик, Маргарита Толстяк

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.