EconPapers    
Economics at your fingertips  
 

Predictive modeling of phishing websites: a comprehensive analysis of novel traits using extra tree classification and optimized hybridization tactics

Zhixia Yao ()
Additional contact information
Zhixia Yao: Zhengzhou Urban Construction Vocational College

International Journal of System Assurance Engineering and Management, 2025, vol. 16, issue 10, No 7, 3308-3324

Abstract: Abstract Phishing is more and more becoming a standard online threat, mainly due to social networking, web technology, and mobile innovations. Phishing taxonomies have mainly targeted core phishing processes, not the newly developed attack tactics, target environments, or defenses against emerging phishing types. Phishing poses a serious problem in the field of computer science, and more so in e-commerce and e-banking, which are responsible for the count of online transactions with payments. Sophisticated phishing page evolution requires adaptive countermeasures. Relying on machine learning (ML) to provide dynamic defence against these cunning baits. ML schemes circumvent static blacklists and instead identify new as well as repeated phishing attempts at an early rate by a look at traits like URLs, content, and user behavior. However, an ongoing evolutionary element enters the picture with phishers continuously adjusting their modus operandi. The battle is to be a step ahead, and ML's adaptability has shown its true value in this endless battle of the digital world. Extra tree classification (ETC) was used in this study to detect such phishing websites. Optimization method was utilized in this study, using 2 optimizers, Chaos gaming optimization (CGO) and tasmanian devil optimization (TDO), in the original model to increase its performance. Compared to ETC and ETCG, the ETTD model functions very well, and it is the best model in this paper. 2 percent makes up the difference between the ETTD model and the ETCG model, while about 6 percent makes the difference between the ETTD model and the ETC model.

Keywords: Phishing; Extra tree classification; Tasmanian devil optimization; Chaos gaming optimization (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s13198-025-02856-8 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:16:y:2025:i:10:d:10.1007_s13198-025-02856-8

Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198

DOI: 10.1007/s13198-025-02856-8

Access Statistics for this article

International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar

More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-10-12
Handle: RePEc:spr:ijsaem:v:16:y:2025:i:10:d:10.1007_s13198-025-02856-8