DETECTING PHISHING URLS BASED ON HEURISTIC RULES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.28.830

Keywords:

phishing, phishing sites, heuristic rules, classification, legitimate URL, rule effectiveness

Abstract

The growing number of cyber threats, including phishing attacks, requires the development of effective phishing detection methods. Phishing is one of the most widespread and dangerous forms of cybercrime aimed at gaining access to confidential user information by manipulating their trust. The methodology of social engineering attacks is evolving rapidly, which creates challenges for cybersecurity professionals. This study discusses a rule-based heuristic approach to detecting phishing URLs that analyses various characteristics of web addresses, such as atypical link structure, suspicious characters, or incorrect word sequences in domain names, to identify potential threats. A mind map, as a visualisation tool, provides a structured and logically ordered approach to analysing phishing website detection methods. It clearly demonstrates the relationships between various rules aimed at identifying suspicious behaviour of web resources, and also allows you to clearly trace the classification of characteristics inherent in phishing attacks. This map summarises the key features used to analyse URLs, allowing for a structured presentation of the criteria for assessing a potential threat. Having a clear classification of heuristic detection rules, the accuracy of identifying phishing websites is significantly improved, protecting users from possible attacks. The study evaluates the effectiveness of individual heuristic rules and their combinations, which gives an idea of their applicability to automated phishing detection systems. For this purpose, we use key metrics that determine the quality of the algorithm and its ability to distinguish between phishing and legitimate websites, namely reliability, true positive rate, false positive rate, accuracy, and F-1 score. The results demonstrate the feasibility of heuristic detection as a simple, effective and understandable alternative to complex machine learning models.

Downloads

Download data is not yet available.

References

Mashtalir, V. et al. (2024). Kiberborot'ba v umovakh zbroinoho protystoiannia: analiz, stratehii ta vyklyky. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony, 49(1), 93–104. https://doi.org/10.33099/2311-7249/2024-49-1-93-104

Alkhalil, Z. та ін. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3. https://doi.org/10.3389/fcomp.2021.563060

Marchal, S., Saari, K., Singh, N., & Asokan, N. (2016). Know your phish: Novel techniques for detecting phishing sites and their targets. In Proceedings of the IEEE 36th International Conference on Distributed Computing Systems (ICDCS), 323–333. https://doi.org/10.48550/arXiv.1510.06501

Buchyk, S., Shutenko, D., & Toliupa, S. (2022). Phishing Attacks Detection. In IX International Scientific Conference “Information Technology and Implementation" (IT&I-2022), Workshop Proceedings, 193–201. https://ceur-ws.org/Vol-3384/Short_7.pdf

What is phishing? | Microsoft security suite. (n.d.). Microsoft. https://www.microsoft.com/uk-ua/security/business/security-101/what-is-phishing

Phishing, Technique T1566 - Enterprise | MITRE ATT&CK®. (n.d.). MITRE ATT&CK®. https://attack.mitre.org/techniques/T1566/

Alabdan, R. (2020). Phishing attacks survey: types, vectors, and technical approaches. Future Internet, 12(10), 168. https://doi.org/10.3390/fi12100168

Mohammad, R., Thabtah, F., & Mccluskey, T. (2012). An assessment of features related to phishing websites using an automated technique. In 2012 International Conference on Information and Computer Science (ICICS), 492–497. https://ieeexplore.ieee.org/document/6470857

Phishtank. (n.d.). https://www.phishtank.com

Ozcan, A., et al. (2021). A hybrid DNN–LSTM model for detecting phishing URLs. Neural Computing and Applications. https://doi.org/10.1007/s00521-021-06401-z

Downloads


Abstract views: 0

Published

2025-06-26

How to Cite

Buchyk, S., & Tolstiak, M. (2025). DETECTING PHISHING URLS BASED ON HEURISTIC RULES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 565–574. https://doi.org/10.28925/2663-4023.2025.28.830