{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T09:37:49Z","timestamp":1774517869844,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"24","license":[{"start":{"date-parts":[[2021,12,10]],"date-time":"2021-12-10T00:00:00Z","timestamp":1639094400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R \\&amp; D Program of China Grant Numbers","award":["2017YFB0802800"],"award-info":[{"award-number":["2017YFB0802800"]}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4202002"],"award-info":[{"award-number":["4202002"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Phishing has become one of the biggest and most effective cyber threats, causing hundreds of millions of dollars in losses and millions of data breaches every year. Currently, anti-phishing techniques require experts to extract phishing sites features and use third-party services to detect phishing sites. These techniques have some limitations, one of which is that extracting phishing features requires expertise and is time-consuming. Second, the use of third-party services delays the detection of phishing sites. Hence, this paper proposes an integrated phishing website detection method based on convolutional neural networks (CNN) and random forest (RF). The method can predict the legitimacy of URLs without accessing the web content or using third-party services. The proposed technique uses character embedding techniques to convert URLs into fixed-size matrices, extract features at different levels using CNN models, classify multi-level features using multiple RF classifiers, and, finally, output prediction results using a winner-take-all approach. On our dataset, a 99.35% accuracy rate was achieved using the proposed model. An accuracy rate of 99.26% was achieved on the benchmark data, much higher than that of the existing extreme model.<\/jats:p>","DOI":"10.3390\/s21248281","type":"journal-article","created":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T01:29:33Z","timestamp":1639358973000},"page":"8281","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":58,"title":["Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4330-6208","authenticated-orcid":false,"given":"Rundong","family":"Yang","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Kangfeng","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0535-6236","authenticated-orcid":false,"given":"Chunhua","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1520-9053","authenticated-orcid":false,"given":"Xiujuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Technology, Beijing 100124, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,10]]},"reference":[{"key":"ref_1","unstructured":"(2021). Phishing Activity Trends Report: 4rd Quarter 2020. Anti-Phishing Work. Group. Retrieved April, 30, 2020."},{"key":"ref_2","unstructured":"FBI (2020, February 11). 2019 Internet Crime Report Released-FBI, Available online: https:\/\/www.fbi.gov\/news\/stories\/2019-internet-crime-report-released-021120."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cosrev.2015.04.001","article-title":"Tutorial and critical analysis of phishing websites methods","volume":"17","author":"Mohammad","year":"2015","journal-title":"Comput. Sci. Rev."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.3844\/jcssp.2012.1099.1107","article-title":"Evolving fuzzy neural network for phishing emails detection","volume":"8","author":"Almomani","year":"2012","journal-title":"J. Comput. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Prakash, P., Kumar, M., Kompella, R.R., and Gupta, M. (2010, January 14\u201319). Phishnet: Predictive blacklisting to detect phishing attacks. Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"ref_6","unstructured":"Zhang, J., Porras, P.A., and Ullrich, J. (August, January 28). Highly Predictive Blacklisting. Proceedings of the USENIX Security Symposium, San Jose, CA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Cao, Y., Han, W., and Le, Y. (2008, January 31). Anti-phishing based on automated individual white-list. Proceedings of the 4th ACM Workshop on Digital Identity Management, Alexandria, VA, USA.","DOI":"10.1145\/1456424.1456434"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Srinivasa Rao, R., and Pais, A.R. (2017, January 2\u20134). Detecting phishing websites using automation of human behavior. Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, Abu Dhabi, United Arab Emirates.","DOI":"10.1145\/3055186.3055188"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.procs.2015.06.017","article-title":"Phishshield: A desktop application to detect phishing webpages through heuristic approach","volume":"54","author":"Rao","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Joshi, Y., Saklikar, S., Das, D., and Saha, S. (2008, January 14\u201317). PhishGuard: A browser plug-in for protection from phishing. Proceedings of the 2008 2nd International Conference on Internet Multimedia Services Architecture and Applications, Las Vegas, NV, USA.","DOI":"10.1109\/IMSAA.2008.4753929"},{"key":"ref_11","unstructured":"Teraguchi, N.C.R.L.Y., and Mitchell, J.C. (2004, January 5). Client-side defense against web-based identity theft. Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","article-title":"Machine learning based phishing detection from URLs","volume":"117","author":"Sahingoz","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3851","DOI":"10.1007\/s00521-017-3305-0","article-title":"Detection of phishing websites using an efficient feature-based machine learning framework","volume":"31","author":"Rao","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_14","unstructured":"Le, H., Pham, Q., Sahoo, D., and Hoi, S.C. (2018). URLNet: Learning a URL representation with deep learning for malicious URL detection. arXiv."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2019599.2019606","article-title":"Cantina+ a feature-rich machine learning framework for detecting phishing web sites","volume":"14","author":"Xiang","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_16","unstructured":"Huh, J.H., and Kim, H. (2011, January 12\u201313). Phishing detection with popular search engines: Simple and effective. Proceedings of the International Symposium on Foundations and Practice of Security, Paris, France."},{"key":"ref_17","unstructured":"Whittaker, C., Ryner, B., and Nazif, M. (March, January 28). Large-scale automatic classification of phishing pages. Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, CA, USA."},{"key":"ref_18","unstructured":"Miyamoto, D., Hazeyama, H., and Kadobayashi, Y. (2008, January 8\u201311). An evaluation of machine learning-based methods for detection of phishing sites. Proceedings of the International Conference on Neural Information Processing, Vancouver, BC, Canada."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J.I., and Cranor, L.F. (2007, January 8\u201312). Cantina: A content-based approach to detecting phishing web sites. Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada.","DOI":"10.1145\/1242572.1242659"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Pan, Y., and Ding, X. (2006, January 11\u201315). Anomaly based web phishing page detection. Proceedings of the 2006 22nd Annual Computer Security Applications Conference (ACSAC\u201906), Miami Beach, FL, USA.","DOI":"10.1109\/ACSAC.2006.13"},{"key":"ref_21","unstructured":"Bouvrie, J. (2006). Notes on Convolutional Neural Networks. Neural Nets, Available online: http:\/\/cogprints.org\/5869\/."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12046-020-01392-4","article-title":"Efficient deep learning techniques for the detection of phishing websites","volume":"45","author":"Somesha","year":"2020","journal-title":"S\u0101dhan\u0101"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"102662","DOI":"10.1016\/j.jnca.2020.102662","article-title":"Detecting Internet of Things attacks using distributed deep learning","volume":"163","author":"Parra","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Aljofey, A., Jiang, Q., Qu, Q., Huang, M., and Niyigena, J.P. (2020). An effective phishing detection model based on character level convolutional neural network from URL. Electronics, 9.","DOI":"10.3390\/electronics9091514"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"106438","DOI":"10.1016\/j.dib.2020.106438","article-title":"Datasets for phishing websites detection","volume":"33","author":"Podgorelec","year":"2020","journal-title":"Data Brief"},{"key":"ref_26","first-page":"2595794","article-title":"Pdrcnn: Precise phishing detection with recurrent convolutional neural networks","volume":"2019","author":"Wang","year":"2019","journal-title":"Secur. Commun. Networks"},{"key":"ref_27","unstructured":"Jain, A.K., and Gupta, B. (2016, January 16\u201318). Comparative analysis of features based machine learning approaches for phishing detection. Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Lee, L.H., Lee, K.C., Chen, H.H., and Tseng, Y.H. (2014, January 3\u20137). Poster: Proactive blacklist update for anti-phishing. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2662362"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/s12559-010-9042-7","article-title":"Experimental case studies for investigating e-banking phishing techniques and attack strategies","volume":"2","author":"Aburrous","year":"2010","journal-title":"Cogn. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"5948","DOI":"10.1016\/j.eswa.2014.03.019","article-title":"Phishing detection based associative classification data mining","volume":"41","author":"Abdelhamid","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1016\/j.asoc.2016.08.005","article-title":"A new fast associative classification algorithm for detecting phishing websites","volume":"48","author":"Hadi","year":"2016","journal-title":"Appl. Soft Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"17020","DOI":"10.1109\/ACCESS.2017.2743528","article-title":"Phishing-alarm: Robust and efficient phishing detection via page component similarity","volume":"5","author":"Mao","year":"2017","journal-title":"IEEE Access"},{"key":"ref_33","unstructured":"Lin, Y., Liu, R., Divakaran, D.M., Ng, J.Y., Chan, Q.Z., Lu, Y., Si, Y., Zhang, F., and Dong, J.S. (2021, January 11\u201313). Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages. Proceedings of the 30th {USENIX} Security Symposium ({USENIX} Security 21), Virtual Event."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-017-0098-1","article-title":"A novel lightweight URL phishing detection system using SVM and similarity index","volume":"7","author":"Zouina","year":"2017","journal-title":"Hum. Centric Comput. Inf. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Toolan, F., and Carthy, J. (2010, January 18\u201320). Feature selection for spam and phishing detection. Proceedings of the 2010 eCrime Researchers Summit, Dallas, TX, USA.","DOI":"10.1109\/ecrime.2010.5706696"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"73271","DOI":"10.1109\/ACCESS.2019.2920655","article-title":"OFS-NN: An effective phishing websites detection model based on optimal feature selection and neural network","volume":"7","author":"Zhu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","article-title":"Predicting phishing websites based on self-structuring neural network","volume":"25","author":"Mohammad","year":"2014","journal-title":"Neural Comput. Appl."},{"key":"ref_38","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume":"28","author":"Zhang","year":"2015","journal-title":"Adv. Neural Inf. Process. Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/24\/8281\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:45:23Z","timestamp":1760168723000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/24\/8281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,10]]},"references-count":38,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["s21248281"],"URL":"https:\/\/doi.org\/10.3390\/s21248281","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,10]]}}}