{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T21:45:01Z","timestamp":1769031901216,"version":"3.49.0"},"reference-count":34,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>Over the past few years, phishing has evolved into an increasingly prevalent form of cybercrime, as more people use the Internet and its applications. Phishing is a type of social engineering that targets users' sensitive or personal information. This paper seeks to achieve two main objectives: first, to identify the most effective classifier for detecting phishing among 40 classifiers representing six learning strategies. Secondly, it aims to determine which feature selection method performs best on websites with phishing datasets. By analyzing three unique datasets on phishing and evaluating eight metrics, this study found that Random Forest and Random Tree were superior at identifying phishing websites compared with other approaches. Similarly, GainRatioAttributeEval, along with InfoGainAttributeEval, performed better than the five alternative feature selection methods considered in this study.<\/jats:p>","DOI":"10.3389\/fcomp.2025.1687867","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T06:41:25Z","timestamp":1768977685000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Identifying key features for phishing website detection through feature selection techniques"],"prefix":"10.3389","volume":"7","author":[{"given":"Raed","family":"Alazaidah","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Zarqa University","place":["Zarqa, Jordan"]}]},{"given":"Mohammad","family":"BaniSalman","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Zarqa University","place":["Zarqa, Jordan"]}]},{"given":"Khaled E.","family":"Alqawasmi","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Zarqa University","place":["Zarqa, Jordan"]}]},{"given":"Ali","family":"Abu Zaid","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Zarqa University","place":["Zarqa, Jordan"]}]},{"given":"Yousuf","family":"Hazaimeh","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Zarqa University","place":["Zarqa, Jordan"]}]},{"given":"Fuad Sameh","family":"Alshraiedeh","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Zarqa University","place":["Zarqa, Jordan"]}]},{"given":"Emma","family":"Qumsiyeh","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Information Technology, Palestine Ahliya University","place":["Bethlehem, Palestine"]}]}],"member":"1965","published-online":{"date-parts":[[2026,1,21]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"5948","DOI":"10.1016\/j.eswa.2014.03.019","article-title":"Phishing detection based associative classification data mining","volume":"41","author":"Abdelhamid","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"B2","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/ICICS52457.2021.9464539","article-title":"\u201cURL phishing detection using machine learning techniques based on URLs lexical analysis,\u201d","volume-title":"2021 12th International Conference on Information and Communication Systems (ICICS)","author":"Abutaha","year":"2021"},{"key":"B3","first-page":"47","article-title":"Evaluating conditional and unconditional correlations capturing strategies in multi label classification","volume":"10","author":"Alazaidah","year":"2018","journal-title":"J. Telecommun. Electr. Comput. Eng."},{"key":"B4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.18576\/jsap\/130108","article-title":"Website phishing detection using machine learning techniques","volume":"13","author":"Alazaidah","year":"2024","journal-title":"J. Stat. Applic. Probab."},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1063\/5.0177340","article-title":"\u201cThe significance of capturing the correlations among labels in multi-label classification: an investigative study,\u201d","volume":"2979","author":"Alazaidah","year":"","journal-title":"AIP Conference Proceedings"},{"key":"B6","doi-asserted-by":"publisher","first-page":"27","DOI":"10.3390\/diagnostics14010027","article-title":"Potential of machine learning for predicting sleep disorders: a comprehensive analysis of regression and classification models","volume":"14","author":"Alazaidah","year":"","journal-title":"Diagnostics"},{"key":"B7","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.14569\/IJACSA.2023.0140954","article-title":"Intelligent heart disease prediction system with applications in Jordanian hospitals","volume":"14","author":"Al-Batah","year":"2023","journal-title":"Int. J. Adv. Comput. Sci. Applic."},{"key":"B8","doi-asserted-by":"publisher","first-page":"104170","DOI":"10.1016\/j.jnca.2025.104170","article-title":"Comprehensive phishing detection: a multi-channel approach with variants TCN fusion leveraging URL and HTML features","volume":"238","author":"Aljofey","year":"2025","journal-title":"J. Netw. Comput. Applic."},{"key":"B9","article-title":"New features selection method for multi-label classification based on the positive dependencies among labels","author":"Alluwaici","year":"2020","journal-title":"Solid State Technol."},{"key":"B10","doi-asserted-by":"publisher","first-page":"2040017","DOI":"10.1142\/S0219649220400171","article-title":"New problem transformation method based on the local positive pairwise dependencies among labels","volume":"19","author":"Alluwaici","year":"2020","journal-title":"J. Inform. Knowl. Manag."},{"key":"B11","doi-asserted-by":"publisher","first-page":"179","DOI":"10.5267\/j.ijdns.2023.10.006","article-title":"Diagnosing diabetes mellitus using machine learning techniques","volume":"8","author":"Alzyoud","year":"2024","journal-title":"Int. J. Data Netw. Sci."},{"key":"B12","unstructured":"Anti-Phishing Working Group\n          Phishing Activity Trends Reports, 4th Quarter 2020\n          \n          2021"},{"key":"B13","first-page":"337","article-title":"\u201cTowards the detection of phishing attacks,\u201d","volume-title":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)","author":"Athulya","year":"2020"},{"key":"B14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41060-025-00728-9","article-title":"Web-based phishing URL detection model using deep learning optimization techniques","volume":"20","author":"Barik","year":"2025","journal-title":"Int. J. Data Sci. Anal."},{"key":"B15","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/ICCES45898.2019.9002145","article-title":"\u201cA machine learning approach for URL based web phishing using fuzzy logic as classifier,\u201d","volume-title":"2019 International Conference on Communication and Electronics Systems (ICCES)","author":"Chapla","year":"2019"},{"key":"B16","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","article-title":"A new hybrid ensemble feature selection framework for machine learning-based phishing detection system","volume":"484","author":"Chiew","year":"2019","journal-title":"Inform. Sci"},{"key":"B17","author":"Cui","year":"2019","journal-title":"Detection and Analysis of Phishing Attacks"},{"key":"B18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-981-15-8711-5_12","article-title":"An efficient approach for phishing detection using machine learning, multimedia security: algorithm development","author":"Gandotra","year":"2021","journal-title":"Anal. Applic."},{"key":"B19","doi-asserted-by":"publisher","first-page":"104894","DOI":"10.1016\/j.engappai.2022.104894","article-title":"A hybrid feature selection scheme for high-dimensional data","volume":"113","author":"Ganjei","year":"2022","journal-title":"Eng. Appl. Artif. Intell."},{"key":"B20","first-page":"15","article-title":"\u201cStatistical learning,\u201d","volume-title":"An Introduction to Statistical Learning: With Applications in Python","author":"Gareth","year":"2023"},{"key":"B21","author":"Mohammad","year":"2015","journal-title":"Phishing Websites Features"},{"key":"B22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2022.3146923","article-title":"An improved deep network-based scene classification method for self-driving cars","volume":"71","author":"Ni","year":"2022","journal-title":"IEEE Trans. Instrument. Measur."},{"key":"B23","doi-asserted-by":"publisher","first-page":"478","DOI":"10.34028\/iajit\/19\/3A\/8","article-title":"Stacknet based decision fusion classifier for network intrusion detection","volume":"19","author":"Nti","year":"2022","journal-title":"Int. Arab J. Inform. Technol."},{"key":"B24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.34028\/iajit\/19\/4\/15","article-title":"Smoke detection algorithm based on negative sample mining","volume":"19","author":"Pei","year":"2022","journal-title":"Int. Arab J. Inform. Technol."},{"key":"B25","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/s12652-019-01311-4","article-title":"CatchPhish: detection of phishing Websites by inspecting URLs","volume":"11","author":"Rao","year":"2020","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"B26","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/SMART-TECH49988.2020.00026","article-title":"\u201cPhishing detection using machine learning technique,\u201d","volume-title":"2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH)","author":"Rashid","year":"2020"},{"key":"B27","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","article-title":"Machine learning based phishing detection from URLs","volume":"117","author":"Sahingoz","year":"2019","journal-title":"Expert Syst. Applic"},{"key":"B28","doi-asserted-by":"publisher","first-page":"10","DOI":"10.5120\/15389-3809","article-title":"Weka: a tool for data preprocessing, classification, ensemble, clustering and association rule mining","volume":"88","author":"Srivastava","year":"2014","journal-title":"Int. J. Comput. Applic."},{"key":"B29","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jsr.2023.08.008","article-title":"Machine learning approach to determine the decision rules in ergonomic assessment of working posture in sewing machine operators","volume":"87","author":"Su","year":"2023","journal-title":"J. Saf. Res"},{"key":"B30","unstructured":"Tan\n              C. L.\n            \n          \n          Phishing Dataset for Machine Learning: Feature Evaluation\n          \n          2018"},{"key":"B31","doi-asserted-by":"publisher","first-page":"252","DOI":"10.14569\/IJACSA.2019.0100133","article-title":"Phishing Website detection: an improved accuracy through feature selection and ensemble learning","volume":"10","author":"Ubing","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"B32","first-page":"262","article-title":"Early prediction of cervical cancer using machine learning techniques","volume":"32","author":"Vigneswari","year":"2021","journal-title":"Turkish J. Physiother. Rehabil"},{"key":"B33","author":"Warburton","year":"2020","journal-title":"2020 Phishing and Fraud Report"},{"key":"B34","doi-asserted-by":"crossref","DOI":"10.1109\/FUZZ-IEEE.2019.8858884","article-title":"\u201cFuzzy rough set feature selection to enhance phishing attack detection,\u201d","volume-title":"2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","author":"Zabihimayvan","year":"2019"}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2025.1687867\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T06:41:28Z","timestamp":1768977688000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2025.1687867\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,21]]},"references-count":34,"alternative-id":["10.3389\/fcomp.2025.1687867"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2025.1687867","relation":{},"ISSN":["2624-9898"],"issn-type":[{"value":"2624-9898","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,21]]},"article-number":"1687867"}}