{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:06:52Z","timestamp":1760148412247,"version":"build-2065373602"},"reference-count":41,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Universiti Tun Hussein Onn Malaysia and the UTHM Publisher\u2019s Office","award":["E15216"],"award-info":[{"award-number":["E15216"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users\u2019 confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraudulent attempts. Internet scammers often use phishing attacks, which have no boundaries, since they could exceed hijacking conventional cyber ecosystems to hack intelligent systems, which emerged recently for the use within smart cities. This paper therefore develops a real-time framework inspired by the honeybee defense mechanism in nature for filtering phishing website attacks in smart cities. In particular, the proposed framework filters phishing websites through three main phases of investigation: PhishTank-Match (PM), Undesirable-Absent (UA), and Desirable-Present (DP) investigation phases. The PM phase is used at first in order to check whether the requested URL is listed in the blacklist of the PhishTank database. On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. The obtained results show that the proposed framework is deployable and capable of filtering various types of phishing website by maintaining a low rate of false alarms.<\/jats:p>","DOI":"10.3390\/s23094284","type":"journal-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T04:42:54Z","timestamp":1682484174000},"page":"4284","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Honeybee-Inspired Framework for a Smart City Free of Internet Scams"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9748-6067","authenticated-orcid":false,"given":"Abdulghani Ali","family":"Ahmed","sequence":"first","affiliation":[{"name":"School of Computer Science and Informatics, De Montfort University, The Gateway, Leicester LE1 9BH, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8062-1258","authenticated-orcid":false,"given":"Ali","family":"Al-Bayatti","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, De Montfort University, The Gateway, Leicester LE1 9BH, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8262-1596","authenticated-orcid":false,"given":"Mubarak","family":"Saif","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Parit Raja 86400, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5164-8403","authenticated-orcid":false,"given":"Waheb A.","family":"Jabbar","sequence":"additional","affiliation":[{"name":"School of Engineering and the Built Environment, Birmingham City University, Birmingham B4 7XG, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6259-0622","authenticated-orcid":false,"given":"Taha H.","family":"Rassem","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, De Montfort University, The Gateway, Leicester LE1 9BH, UK"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,26]]},"reference":[{"key":"ref_1","unstructured":"Ludl, C., McAllister, S., Kirda, E., and Kruegel, C. (2007). Detection of Intrusions and Malware, and Vulnerability Assessment, Springer."},{"key":"ref_2","unstructured":"(2015, March 30). Anti-Phishing Working Group Phishing, Anti-Phishing Working Group Phishing Trends Report. Available online: https:\/\/apwg.org\/."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"857","DOI":"10.5267\/j.ijdns.2023.1.003","article-title":"A new phishing-website detection framework using ensemble classification and clustering","volume":"7","author":"Alsharaiah","year":"2023","journal-title":"Int. J. Data Netw. Sci."},{"key":"ref_4","unstructured":"Intelligence, M.S. (2023, February 20). Microsoft Digital Defense Report. Available online: https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-digital-defense-report-2022."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1016\/j.procs.2017.05.391","article-title":"Cyber security attacks on smart cities and associated mobile technologies","volume":"109","author":"AlDairi","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_6","first-page":"612","article-title":"Smart cities: A survey on security concerns","volume":"7","author":"Ijaz","year":"2016","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_7","unstructured":"Eric, C.-T., and Loretta, J.S. (2023). Handbook on Crime and Technology, Edward Elgar Publishing."},{"key":"ref_8","first-page":"18","article-title":"Social Engineering Attacks Techniques","volume":"3","author":"Fadhil","year":"2023","journal-title":"Int. J. Progress. Res. Eng. Manag. Sci. IJPREMS"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","article-title":"Social phishing","volume":"50","author":"Jagatic","year":"2007","journal-title":"Commun. ACM"},{"key":"ref_10","unstructured":"(2014, March 12). Why HTTPS and SSL Are Not Secure as You Think. Available online: http:\/\/scottiestech.info\/2014\/03\/12\/why-https-and-ssl-are-not-as-secure-as-you-think."},{"key":"ref_11","first-page":"8088","article-title":"PhishSys: A Honey Bee Inspired Intelligent System for Phishing Websites Detection","volume":"12","author":"Ahmed","year":"2017","journal-title":"J. Eng. Appl. Sci."},{"key":"ref_12","unstructured":"(2022, March 03). PhishTank | Join the Fight against Phishing. (N.D.). Available online: https:\/\/www.phishtank.com\/."},{"key":"ref_13","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., and Mitchell, J.C. (2004, January 5). Client-Side Defense Against Web-Based Identity Theft. Proceedings of the NDSS 2004, San Diego, CA, USA."},{"key":"ref_14","unstructured":"Sheng, S., Wardman, B., Warner, G., Cranor, L.F., Hong, J., and Zhang, C. (2009, January 16\u201317). An empirical analysis of phishing blacklists. Proceedings of the International Conference on Email and Anti-Spam, Mountain View, CA, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J.I., and Cranor, L.F. (2007, January 8\u201312). Cantina: A content-based approach to detecting phishing web sites. Proceedings of the 16th International Conference on World Wide Web, New York, NY, USA.","DOI":"10.1145\/1242572.1242659"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., and Shelly, D. (2010, January 9\u201315). Goldphish: Using images for content-based phishing analysis. Proceedings of the Internet Monitoring and Protection (ICIMP), 2010 Fifth International Conference on Internet Monitoring and Protection, Barcelona, Spain.","DOI":"10.1109\/ICIMP.2010.24"},{"key":"ref_17","first-page":"5688","article-title":"Phishing website detection system based on enhanced itree classifier","volume":"10","author":"Krishnan","year":"2015","journal-title":"ARPN J. Eng. Appl. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ahmed, A.A., and Abdullah, N.A. (2016, January 13\u201315). Real time detection of phishing websites. Proceedings of the Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016 IEEE 7th Annual, Vancouver, BC, Canada.","DOI":"10.1109\/IEMCON.2016.7746247"},{"key":"ref_19","unstructured":"Cranor, L.F., Egelman, S., Hong, J.I., and Zhang, Y. (March, January 28). Phinding Phish: An Evaluation of Anti-Phishing Toolbars. Proceedings of the NDSS Symposium 2007, San Diego, CA, USA."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Rao, R.S., and Pais, A.R. (2017, January 16\u201320). An enhanced blacklist method to detect phishing websites. Proceedings of the Information Systems Security: 13th International Conference, ICISS, Mumbai, India.","DOI":"10.1007\/978-3-319-72598-7_20"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zheng, R., Zhou, A., Liao, S., and Liu, L. (2020). Automatic detection of pornographic and gambling websites based on visual and textual content using a decision mechanism. Sensors, 20.","DOI":"10.3390\/s20143989"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Seifert, C., Welch, I., and Komisarczuk, P. (2008, January 7\u201310). Identification of malicious web pages with static heuristics. Proceedings of the 2008 Australasian Telecommunication Networks and Applications Conference, Adelaide, Australia.","DOI":"10.1109\/ATNAC.2008.4783302"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.eswa.2009.05.023","article-title":"Malicious web content detection by machine learning","volume":"37","author":"Hou","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"ref_24","unstructured":"Justin, M., Lawrence, K., Saul, S.S., and Geoffrey, M.V. (July, January 28). Beyond blacklists: Learning to detect malicious web sites from suspicious URLs. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France."},{"key":"ref_25","unstructured":"Kolari, P., Tim, F., and Anupam, J. (2006, January 27\u201329). SVMs for the blogosphere: Blog identification and splog detection. Proceedings of the AAAI Spring Symposium on Computational Approaches to Analysing Weblogs, Stanford, CA, USA."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Rajadesingan, A., and Kumaraguru, P. (2012, January 23\u201324). PhishAri: Automatic realtime phishing detection on twitter. Proceedings of the 2012 eCrime Researchers Summit, Las Croabas, PR, USA.","DOI":"10.1109\/eCrime.2012.6489521"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Subasi, A., Molah, E., Almkallawi, F., and Chaudhery, T.J. (2017, January 21\u201323). Intelligent phishing website detection using random forest classifier. Proceedings of the 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), Ras Al Khaimah, United Arab Emirates.","DOI":"10.1109\/ICECTA.2017.8252051"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","article-title":"A new hybrid ensemble feature selection framework for machine learning-based phishing detection system","volume":"484","author":"Chiew","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.future.2018.11.004","article-title":"A stacking model using URL and HTML features for phishing webpage detection","volume":"94","author":"Li","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1016\/j.comcom.2011.03.013","article-title":"SLA-based complementary approach for network intrusion detection","volume":"34","author":"Ahmed","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.tibtech.2008.02.007","article-title":"Using insect sniffing devices for detection","volume":"26","author":"Rains","year":"2008","journal-title":"Trends Biotechnol."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Srinoy, S. (2007, January 1\u20135). Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine. Computational Intelligence in Security and Defense Applications, Proceedings of the CISDA 2007, Honolulu, HA, USA.","DOI":"10.1109\/CISDA.2007.368152"},{"key":"ref_33","first-page":"38","article-title":"Honeybee Protection System for Detecting and Preventing Network Attacks","volume":"64","author":"Jantan","year":"2014","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_34","first-page":"45","article-title":"Honey Bee Intelligent Model for Network Zero Day Attack Detection","volume":"8","author":"Jantan","year":"2014","journal-title":"Int. J. Digit. Content Technol. Its Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1016\/j.anbehav.2008.08.002","article-title":"En garde: Rapid shifts in honeybee, Apis mellifera, guarding behaviour are triggered by onslaught of conspecific intruders","volume":"76","author":"Couvillon","year":"2008","journal-title":"Anim. Behav."},{"key":"ref_36","first-page":"263","article-title":"The behaviour of worker honeybees at the hive entrance","volume":"4","author":"Free","year":"1952","journal-title":"Behaviour"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2637","DOI":"10.1242\/jeb.205.17.2637","article-title":"Honeybee nestmate recognition: The thermal behaviour of guards and their examinees","volume":"205","author":"Stabentheiner","year":"2002","journal-title":"J. Exp. Biol."},{"key":"ref_38","first-page":"873","article-title":"Phishing website detection based on machine learning algorithm","volume":"11","author":"Liu","year":"2020","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., and Rubin, A.D. (2007, January 2). A framework for detection and measurement of phishing attacks. Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, VA, USA.","DOI":"10.1145\/1314389.1314391"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.comcom.2015.10.012","article-title":"Filtration model for the detection of malicious traffic in large-scale networks","volume":"82","author":"Ahmed","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_41","first-page":"15","article-title":"Intrusion detection in computer networks based on machine learning algorithms","volume":"8","author":"Osareh","year":"2008","journal-title":"Int. J. Comput. Sci. Netw. Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/9\/4284\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:23:44Z","timestamp":1760124224000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/9\/4284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":41,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["s23094284"],"URL":"https:\/\/doi.org\/10.3390\/s23094284","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,4,26]]}}}