Submitted:
23 November 2025
Posted:
24 November 2025
Read the latest preprint version here
Abstract
Keywords:
1. Introduction
2. Literature Review
2.1. Phishing and Online Fraud
2.2. Types of Phishing Attacks
2.2.1. Spear Phishing
2.2.2. Vishing
2.2.3. Email Phishing
2.2.4. HTTPS Phishing
2.2.5. Watering Hole Phishing
2.2.6. Smishing
2.2.7. Website Spoofing
2.3. Online Fraud
2.4. Machine Learning Approaches for Phishing Detection
2.5. Technical Protection Methods for Email Security
2.6. Organizational Measures: User Awareness and Training
2.7. Multi-Factor Authentication (MFA) Measure
| Method | Description and Principle of Operation | Advantages | Limitations / Disadvantages |
|---|---|---|---|
| Machine Learning Approaches for Phishing Detection | Uses algorithms like Neural Networks, SVM, and Random Forests to classify phishing and legitimate instances, automatically learning patterns from datasets (e.g., PhishTank, Alexa). | - High accuracy with quality and sufficient data - Can detect previously unseen attack patterns - Adaptive and self-improving models | - Requires labeled data and large datasets - Vulnerable to adversarial examples or evolving attacks - Computationally intensive |
| Technical Protection Methods (DMARC, SPF, DKIM) | Authentication protocols verify domain legitimacy and prevent sender address spoofing. DMARC integrates with SPF and DKIM to enforce domain-level security policies. | - Strong protection against spoofed or forged emails - Enhances domain reputation and trustworthiness - Provides automated reporting and filtering | - May include personal data (GDPR considerations) - Requires proper configuration and continuous maintenance |
| Organizational Measures (User Awareness and Training) | Regular training and awareness programs educate users to recognize phishing attempts and respond correctly. Simulated phishing tests improve user vigilance. | - Improves human factor resilience - Cost-effective and widely applicable - Promotes a culture of cybersecurity awareness | - Effectiveness depends on training quality and frequency - Human errors remain possible |
| Multi-Factor Authentication (MFA) | Uses two or more verification factors (knowledge, possession, or inherence) such as passwords, tokens, or biometrics. Strengthens authentication security and reduces phishing success rates. | - Significantly decreases successful phishing attempts (over 90%) - Increases overall system security - Supports compliance with security regulations | - Implementation and maintenance costs - User resistance and usability challenges - May require additional hardware or software infrastructure |
3. Methodology
3.1. Research Type
- Type of study: Qualitative research with elements of comparative analysis.
- Justification: This design allows the comparison of different protection methods: technical, organizational, without the need for empirical testing. It helps understand research questions related to effectiveness, costs, scalability, and risks.
- Searching for and selecting relevant academic literature and industry reports.
- Classifying protection methods into categories.
- Conducting comparative analysis based on predefined evaluation criteria.
3.2. Objects of the Study
- peer-reviewed scientific articles,
- reports from cybersecurity organizations,
- documented real-world phishing and fraud cases from public sources.
3.3. Materials and Tools
- Databases: Google Scholar and other academic search engines for scientific publications; official websites of cybersecurity companies for industry reports.
- Reports and documents: Publications by Fortinet, GlobalSecurityMag, Microsoft, Hostragons Global Limited, the Certified Senders Alliance, and other organizations.
3.4. Data Collection
- Generate search queries relevant to phishing, online fraud, and protection methods.
- Search selected databases.
- credibility and authority of the source (peer-reviewed journals; official reports from Microsoft, Fortinet, the Certified Senders Alliance, etc).
- relevance (publication period 2019–2025);
- Read, annotate, and code selected literature to extract key findings on protection methods, results, and application conditions.
3.5. Data Analysis Methods
- Classification and coding: All identified protection methods are grouped into predefined categories: machine learning approaches, technical protocols (DMARC, SPF, DKIM), organizational measures, and multi-factor authentication.
- Comparative analysis: Each category is assessed using three criteria: effectiveness, scalability, and limitations or risks.
- Synthesis of results: Findings are summarized, highlighting common patterns, advantages, and disadvantages. A comparative table is produced and supplemented with narrative interpretation.
3.6. Ethical Aspects
3.7. Limitations
4. Results
4.1. Machine Learning Approaches for Phishing Detection
4.2. Technical Protection Methods for Email Security
4.3. Organizational Measures: User Awareness and Training
4.4. Multi-Factor Authentication (MFA) Measure
4.5. Cross-Method Effectiveness
4.6. Comparative Evaluation Table
5. Discussion
6. Conclusion
- early detection and filtering (ML + DMARC/SPF/DKIM),
- reduction of human error (continuous training and simulations),
- robust authentication (phishing-resistant MFA),
- regular auditing and updating of all components.
References
- Microsoft. Protect yourself from phishing, n.d.
- Finscore. Types of online fraud, n.d.
- Jason, J. History of phishing: A deep dive into its global impact, n.d.
- APAC Insider. The evolution of online fraud and how to stay safe, 2024.
- Fortinet. Types of phishing attacks, n.d.
- Rushanth, R. From call to compromise: Darktrace’s response to a vishing-induced network attack, 2024.
- Slavin, B. A roundup of the top phishing attacks in 2024 so far, 2024.
- Raza, M. What is a watering hole attack? Detection and prevention, 2025.
- Gori, M.; Visumathi, J.; Mahdal, M.; Anand, J.; Elangovan, M. An effective and secure mechanism for phishing attacks using a machine learning approach. Processes 2022, 10, 1356. [CrossRef]
- Certified Senders Alliance. Protection contre le phishing: DMARC & RGPD sont-ils compatibles?, 2018.
- Abill, R.; Adaan, A.; Billy, E. Investigating the effectiveness of multi-factor authentication against financial fraud, 2025.
| Protection Method | Effectiveness | Scalability | Limitations / Risks |
|---|---|---|---|
| Machine Learning Approaches for Phishing Detection | High detection accuracy; adaptive to new patterns | High in automated environments; dependent on infrastructure | Susceptible to adversarial evasion; performance drops with data drift |
| Technical Protection (DMARC, SPF, DKIM) | Strong against spoofing and unauthorized domain use | Very high once deployed | Misconfiguration reduces effectiveness; ineffective against phishing from legitimate domains |
| Organizational Measures (Training, Awareness) | Moderate; improves recognition and reduces errors over time | Medium; effectiveness varies across individuals | Human error persists; performance declines without reinforcement; vulnerable to sophisticated social engineering |
| Multi-Factor Authentication (MFA) | Very high for preventing account compromise | High in most organizations | Susceptible to SIM swap and real-time phishing; user resistance to adoption |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).