A comprehensive survey of AI-enabled phishing attacks detection techniques
- PMID: 33110340
- PMCID: PMC7581503
- DOI: 10.1007/s11235-020-00733-2
A comprehensive survey of AI-enabled phishing attacks detection techniques
Abstract
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.
Keywords: Advanced phishing techniques; Cyberattack; Deep learning; Hybrid learning; Internet security; Machine learning; Phishing attack; Security threats.
© Springer Science+Business Media, LLC, part of Springer Nature 2020.
Figures






Similar articles
-
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19.IET Inf Secur. 2022 Sep;16(5):324-345. doi: 10.1049/ise2.12073. Epub 2022 Jul 4. IET Inf Secur. 2022. PMID: 35942004 Free PMC article. Review.
-
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.Sensors (Basel). 2023 Sep 25;23(19):8070. doi: 10.3390/s23198070. Sensors (Basel). 2023. PMID: 37836902 Free PMC article.
-
A hybrid super learner ensemble for phishing detection on mobile devices.Sci Rep. 2025 May 15;15(1):16839. doi: 10.1038/s41598-025-02009-8. Sci Rep. 2025. PMID: 40374830 Free PMC article.
-
Heuristic machine learning approaches for identifying phishing threats across web and email platforms.Front Artif Intell. 2024 Oct 21;7:1414122. doi: 10.3389/frai.2024.1414122. eCollection 2024. Front Artif Intell. 2024. PMID: 39498387 Free PMC article.
-
A deeper look into cybersecurity issues in the wake of Covid-19: A survey.J King Saud Univ Comput Inf Sci. 2022 Nov;34(10):8176-8206. doi: 10.1016/j.jksuci.2022.08.003. Epub 2022 Aug 11. J King Saud Univ Comput Inf Sci. 2022. PMID: 37521180 Free PMC article. Review.
Cited by
-
ML-Based Detection of DDoS Attacks Using Evolutionary Algorithms Optimization.Sensors (Basel). 2024 Mar 5;24(5):1672. doi: 10.3390/s24051672. Sensors (Basel). 2024. PMID: 38475208 Free PMC article.
-
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19.IET Inf Secur. 2022 Sep;16(5):324-345. doi: 10.1049/ise2.12073. Epub 2022 Jul 4. IET Inf Secur. 2022. PMID: 35942004 Free PMC article. Review.
-
How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society.SN Comput Sci. 2022;3(2):170. doi: 10.1007/s42979-022-01069-1. Epub 2022 Feb 23. SN Comput Sci. 2022. PMID: 35224514 Free PMC article.
-
Binary Hunter-Prey Optimization with Machine Learning-Based Cybersecurity Solution on Internet of Things Environment.Sensors (Basel). 2023 Aug 16;23(16):7207. doi: 10.3390/s23167207. Sensors (Basel). 2023. PMID: 37631743 Free PMC article.
-
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.Sensors (Basel). 2021 Jul 14;21(14):4816. doi: 10.3390/s21144816. Sensors (Basel). 2021. PMID: 34300556 Free PMC article.
References
-
- (2016). Apwg trend report. http://docs.apwg.org/reports/apwg_trends_report_q4_2016.pdf. Accessed from 20 July 2020
-
- (2018) Phishing activity trends report. http://docs.apwg.org/reports/apwg_trends_report_q2_2018.pdf. Accessed from 20 July 2020
-
- (2019) Apwg trend report. https://docs.apwg.org/reports/apwg_trends_report_q3_2019.pdf. Accessed from 20 July 2020
-
- (2019) Fbi warns of dramatic increase in business e-mail compromise (bec) schemes—fbi. https://www.fbi.gov/contact-us/field-offices/memphis/news/press-releases.... Accessed from 20 July 2020
-
- (2019) What is phishing? https://www.phishing.org/what-is-phishing. Accessed from 20 July 2020
Publication types
LinkOut - more resources
Full Text Sources