{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:59:34Z","timestamp":1774720774451,"version":"3.50.1"},"reference-count":43,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2024,6,7]]},"abstract":"<jats:p>In the dynamic realm of digital advancements, the persistent menace of phishing attacks continues to jeopardize the security landscape for both individuals and organizations. As cyber attacks continue to proliferate, URL-based phishing attacks are growing rapidly. This paper presents an exploratory study aimed at enhancing cybersecurity measures through the detection of phishing URLs. Our approach involves exploring the integration of Gated Recurrent Units (GRU) with various attention mechanisms to bolster accuracy in discerning between legitimate and phishing URLs. Notably, our study reveals that the implementation of the Bahdanau attention mechanism with GRU yields remarkable results, achieving an accuracy of 98.14%. We conducted experiments on a comprehensive dataset comprising 95,913\u00a0URLs. Our primary objectives include fortifying cybersecurity defenses against phishing threats, innovating through the integration of diverse attention mechanisms with GRU, and substantiating the efficacy of our model through rigorous evaluation metrics. As the realm of cybersecurity confronts escalating challenges, our research not only offers valuable insights but also charts a promising trajectory for future advancements in cybersecurity strategies.<\/jats:p>","DOI":"10.3233\/idt-240026","type":"journal-article","created":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T17:27:26Z","timestamp":1715966846000},"page":"1029-1052","source":"Crossref","is-referenced-by-count":5,"title":["Exploring GRU-based approaches with attention mechanisms for accurate phishing URL detection"],"prefix":"10.1177","volume":"18","author":[{"given":"Jishnu","family":"K S","sequence":"first","affiliation":[]},{"given":"Arthi","family":"B","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/IDT-240026_ref1","doi-asserted-by":"publisher","first-page":"121916","DOI":"10.1109\/ACCESS.2021.3109091","article-title":"COVID-19 and phishing: Effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic","volume":"9","author":"Abroshan","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-240026_ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00768-x"},{"key":"10.3233\/IDT-240026_ref3","doi-asserted-by":"publisher","first-page":"103671","DOI":"10.1016\/j.cose.2023.103671","article-title":"The human factor in phishing: collecting and analyzing user behavior when reading emails","author":"Gallo","year":"2023","journal-title":"Computers and Security"},{"issue":"1","key":"10.3233\/IDT-240026_ref4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.7305\/automatika.2015.04.587","article-title":"Survey on password quality and confidentiality","volume":"56","author":"Solic","year":"2015","journal-title":"Automatika"},{"issue":"2","key":"10.3233\/IDT-240026_ref5","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1016\/j.jksuci.2023.01.004","article-title":"A systematic literature review on phishing website detection techniques","volume":"35","author":"Safi","year":"2023","journal-title":"Journal of King Saud University\u00a0\u2013 Computer and Information Sciences"},{"key":"10.3233\/IDT-240026_ref6","doi-asserted-by":"publisher","first-page":"36429","DOI":"10.1109\/ACCESS.2022.3151903","article-title":"Deep learning for phishing detection: Taxonomy, current challenges and future directions","volume":"10","author":"Do","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-240026_ref7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/JIFS-236371","article-title":"Adapt: Attack detection and prevention via deep learning techniques","volume":"1","author":"Mohan","year":"2024","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"10.3233\/IDT-240026_ref8","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.3233\/JIFS-169431","article-title":"Detecting malicious domain names using deep learning approaches at scale","volume":"1","author":"Vinayakumar","year":"2018","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"10.3233\/IDT-240026_ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04313-w"},{"key":"10.3233\/IDT-240026_ref10","doi-asserted-by":"publisher","first-page":"9233","DOI":"10.1007\/s12652-022-04426-3","article-title":"Highly accurate phishing url detection based on machine learning","volume":"14","author":"Jalil","year":"2023","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"3","key":"10.3233\/IDT-240026_ref11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3611392","article-title":"Single and hybrid-ensemble learning-based phishing website detection: examining impacts of varied nature datasets and informative feature selection technique","volume":"4","author":"Adane","year":"2023","journal-title":"Digital Threats: Research and Practice"},{"key":"10.3233\/IDT-240026_ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04272-2"},{"key":"10.3233\/IDT-240026_ref13","doi-asserted-by":"publisher","first-page":"3549","DOI":"10.1007\/s11277-021-08196-7","article-title":"Smart phishing detection in web pages using supervised deep learning classification and optimization technique adam","volume":"118","author":"Lakshmi","year":"2021","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/IDT-240026_ref14","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/ACCESS.2021.3137636","article-title":"A deep learning-based framework for phishing website detection","volume":"10","author":"Tang","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-240026_ref15","doi-asserted-by":"publisher","first-page":"8052","DOI":"10.1109\/ACCESS.2024.3352629","article-title":"Dephides: Deep learning based phishing detection system","volume":"12","author":"Sahingoz","year":"2024","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-240026_ref16","doi-asserted-by":"publisher","first-page":"42459","DOI":"10.1109\/ACCESS.2022.3168235","article-title":"Pdgan: Phishing detection with generative adversarial networks","volume":"10","author":"Al-Ahmadi","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-240026_ref17","doi-asserted-by":"publisher","first-page":"221214","DOI":"10.1109\/ACCESS.2020.3043188","article-title":"Web2vec: Phishing webpage detection method based on multidimensional features driven by deep learning","volume":"8","author":"Feng","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-240026_ref18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/SMARTGENCON60755.2023.10442975","article-title":"Detection of phishing domain using logistic regression technique and feature extraction using bert classification model","author":"Mittal","year":"2023","journal-title":"2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)"},{"key":"10.3233\/IDT-240026_ref19","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/ICIMCIS60089.2023.10349059","article-title":"Benchmarking model url features and image based for phishing url detection","author":"Nabila","year":"2023","journal-title":"2023 International Conference on Informatics, Multimedia, Cyber and Informations System (ICIMCIS)"},{"issue":"9","key":"10.3233\/IDT-240026_ref20","doi-asserted-by":"publisher","first-page":"5275","DOI":"10.3390\/app13095275","article-title":"A phishing-attack-detection model using natural language processing and deep learning","volume":"13","author":"Benavides-Astudillo","year":"2023","journal-title":"Applied Sciences"},{"key":"10.3233\/IDT-240026_ref21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICASSP49357.2023.10095719","article-title":"A large-scale pretrained deep model for phishing url detection","author":"Wang","year":"2023","journal-title":"ICASSP 2023\u00a0\u2013 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"},{"issue":"3","key":"10.3233\/IDT-240026_ref22","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1049\/ise2.12106","article-title":"An enhanced deep learning-based phishing detection mechanism to effectively identify malicious urls using variational autoencoders","volume":"17","author":"Prabakaran","year":"2023","journal-title":"IET Information Security"},{"issue":"1","key":"10.3233\/IDT-240026_ref23","doi-asserted-by":"publisher","first-page":"143","DOI":"10.15388\/20-INFOR404","article-title":"Comparison of classification algorithms for detection of phishing websites","volume":"31","author":"Vaitkevicius","year":"2020","journal-title":"Informatica"},{"key":"10.3233\/IDT-240026_ref24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICECAA55415.2022.9936112","article-title":"Cnn based prediction analysis for web phishing prevention","author":"Amanullah","year":"2022","journal-title":"2022 International Conference on Edge Computing and Applications (ICECAA)"},{"issue":"1","key":"10.3233\/IDT-240026_ref25","doi-asserted-by":"publisher","first-page":"232","DOI":"10.3390\/electronics12010232","article-title":"A deep learning-based phishing detection system using cnn, lstm, and lstm-cnn","volume":"12","author":"Alshingiti","year":"2023","journal-title":"Electronics"},{"issue":"3","key":"10.3233\/IDT-240026_ref26","doi-asserted-by":"publisher","first-page":"3227","DOI":"10.11591\/ijece.v13i3.pp3227-3243","article-title":"Deep learning in phishing mitigation: a uniform resource locator-based predictive model","volume":"13","author":"Salah","year":"2023","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"10.3233\/IDT-240026_ref27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11235-020-00739-w","article-title":"Phishing website detection using support vector machines and nature-inspired optimization algorithms","volume":"76","author":"Anupam","year":"2021","journal-title":"Telecommunication Systems"},{"issue":"9","key":"10.3233\/IDT-240026_ref28","doi-asserted-by":"publisher","first-page":"4403","DOI":"10.3390\/s23094403","article-title":"A deep learning-based innovative technique for phishing detection in modern security with uniform resource locators","volume":"23","author":"Aldakheel","year":"2023","journal-title":"Sensors"},{"issue":"3","key":"10.3233\/IDT-240026_ref29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.37256\/rrcs.2320232629","article-title":"Machine learning and deep learning for phishing page detection","volume":"2","author":"Patil","year":"2023","journal-title":"Research Reports on Computer Science"},{"key":"10.3233\/IDT-240026_ref30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/idt-220307","article-title":"A deep learning approach to detect phishing websites using cnn for privacy protection","author":"Zaimi","year":"2023","journal-title":"Intelligent Decision Technologies (Preprint)"},{"key":"10.3233\/IDT-240026_ref31","doi-asserted-by":"publisher","DOI":"10.24342\/f49465b2-c68a-4182-9171-075f0ed797d5"},{"key":"10.3233\/IDT-240026_ref32","doi-asserted-by":"publisher","DOI":"10.3390\/fi14110340"},{"key":"10.3233\/IDT-240026_ref33","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1406.1078"},{"key":"10.3233\/IDT-240026_ref34","doi-asserted-by":"crossref","first-page":"207","DOI":"10.18653\/v1\/P16-2034","article-title":"Attention-based bidirectional long short-term memory networks for relation classification","author":"Zhou","year":"2016","journal-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (volume 2: Short Papers)"},{"key":"10.3233\/IDT-240026_ref35","first-page":"2048","article-title":"Show, attend and tell: Neural image caption generation with visual attention","author":"Xu","year":"2015","journal-title":"International Conference on Machine Learning"},{"key":"10.3233\/IDT-240026_ref36","unstructured":"Chorowski JK, Bahdanau D, Serdyuk D, Cho K, Bengio Y. Attention-based models for speech recognition. Advances in Neural Information Processing Systems. 2015; 28."},{"key":"10.3233\/IDT-240026_ref37","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1409.0473"},{"key":"10.3233\/IDT-240026_ref38","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1508.04025"},{"key":"10.3233\/IDT-240026_ref39","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I. Attention is all you need. Advances in Neural Information Processing Systems. 2017; 30."},{"key":"10.3233\/IDT-240026_ref40","unstructured":"Goodfellow I, Bengio Y, Courville A, Bengio Y. Deep Learning. 2016; 1. MIT press Cambridge."},{"issue":"1","key":"10.3233\/IDT-240026_ref41","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"key":"10.3233\/IDT-240026_ref42","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1412.6980"},{"issue":"10","key":"10.3233\/IDT-240026_ref43","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2347736.2347755","article-title":"A few useful things to know about machine learning","volume":"55","author":"Domingos","year":"2012","journal-title":"Communications of the ACM"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-240026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T10:01:31Z","timestamp":1741687291000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-240026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":43,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/idt-240026","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"value":"1872-4981","type":"print"},{"value":"1875-8843","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,7]]}}}