Phishing Attack Detection Through Recursive Feature Elimination Via Cross Validation

Salma Masmoudi*, Habib M. Kammoun, Maha Charfeddine, Bechir Hamdaoui

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Rising phishing attacks pose serious cybersecurity threats due to their use of fraudulent links to collect confidential user information. In this paper, we evaluate the performance of various Machine Learning (ML) models, including Decision Trees, Random Forest, and Extreme Gradient Boosting, to address this growing threat. Additionally, we assess the effectiveness of different feature selection techniques, such as Analysis of Variance, Correlation-based Selection, Mutual Information, and Recursive Feature Elimination with Cross-Validation. Our findings demonstrate that combining Extreme Gradient Boosting with Recursive Feature Elimination and Cross-Validation outperforms previous methods. The proposed solution achieved an accuracy of 9733 %, a recall of 97.1656%, an F1 score of 97.3%, and a precision of 97.42%, highlighting its potential for effectively identifying phishing attacks
Original languageEnglish
Title of host publication2025 International Wireless Communications And Mobile Computing, Iwcmc
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1610-1615
Number of pages6
ISBN (Electronic)9798331508876
ISBN (Print)979-8-3315-0888-3
DOIs
Publication statusPublished - 16 May 2025
Event21st IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2025 - Hybrid, Abu Dhabi, United Arab Emirates
Duration: 12 May 202416 May 2024

Publication series

NameInternational Wireless Communications And Mobile Computing Conference

Conference

Conference21st IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2025
Country/TerritoryUnited Arab Emirates
CityHybrid, Abu Dhabi
Period12/05/2416/05/24

Keywords

  • Cybersecurity
  • Data Balancing
  • feature Selection
  • Machine Learning
  • Phishing Detection
  • URL Analysis

Fingerprint

Dive into the research topics of 'Phishing Attack Detection Through Recursive Feature Elimination Via Cross Validation'. Together they form a unique fingerprint.

Cite this