Submitted:
25 November 2025
Posted:
26 November 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Literature Review
2.1. Phishing and Online Fraud
2.2. Types of Phishing Attacks
2.2.1. Spear Phishing
2.2.2. Vishing
2.2.3. Email Phishing
2.2.4. HTTPS Phishing
2.2.5. Watering Hole Phishing
2.2.6. Smishing
2.2.7. Website Spoofing
2.3. Online Fraud
2.4. Machine Learning Approaches for Phishing Detection
2.5. Technical Protection Methods for Email Security
2.6. Organizational Measures: User Awareness and Training
2.7. Multi-Factor Authentication (MFA) Measure
| Method | Description and Principle of Operation | Advantages | Limitations / Disadvantages |
|---|---|---|---|
| Machine Learning Approaches for Phishing Detection | Uses algorithms like Neural Networks, SVM, and Random Forests to classify phishing and legitimate instances, automatically learning pat- terns from datasets (e.g., PhishTank, Alexa). |
|
|
| Technical Protection Methods (DMARC, SPF, DKIM) | Authentication protocols verify domain legitimacy and prevent sender ad- dress spoofing. DMARC integrates with SPF and DKIM to enforce domain-level security policies. |
|
|
|
Organizational Measures (User Awareness and Training) |
Regular training and awareness programs educate users to recog- nize phishing attempts and respond correctly. Simulated phishing tests improve user vigilance. |
|
|
|
Multi-Factor Authentication (MFA) |
Uses two or more ver- ification factors (knowl- edge, possession, or in- herence) such as pass- words, tokens, or bio- metrics. Strengthens au- thentication security and reduces phishing success rates. |
|
|
3. Methodology
3.1. Research Type
- Type of study: Qualitative research with elements of comparative analysis.
- Justification: This design allows the comparison of different protection methods: technical, organizational, without the need for empirical testing. It helps understand research questions related to effectiveness, costs, scalability, and risks.
- Searching for and selecting relevant academic literature and industry reports.
- Classifying protection methods into categories.
- Conducting comparative analysis based on predefined evaluation criteria.
3.2. Objects of the Study
- peer-reviewed scientific articles,
- reports from cybersecurity organizations,
- documented real-world phishing and fraud cases from public sources.
3.3. Materials and Tools
- Databases: Google Scholar and other academic search engines for scientific publications; official websites of cybersecurity companies for industry reports.
- Reports and documents: Publications by Fortinet, GlobalSecurityMag, Microsoft, Hostragons Global Limited, the Certified Senders Alliance, and other organizations.
3.4. Data Collection
- Generate search queries relevant to phishing, online fraud, and protection methods.
- Search selected databases.
- credibility and authority of the source (peer-reviewed journals; official reports from Microsoft, Fortinet, the Certified Senders Alliance, etc).
- relevance (publication period 2019–2025);
- Read, annotate, and code selected literature to extract key findings on protection methods, results, and application conditions.
3.5. Data Analysis Methods
- Classification and coding: All identified protection methods are grouped into predefined categories: machine learning approaches, technical protocols (DMARC, SPF, DKIM), organizational measures, and multi-factor authentication.
- Comparative analysis: Each category is assessed using three criteria: effectiveness, scalability, and limitations or risks.
- Synthesis of results: Findings are summarized, highlighting common patterns, advantages, and disadvantages. A comparative table is produced and supplemented with narrative interpretation.
3.6. Ethical Aspects
3.7. Limitations
4. Results
4.1. Machine Learning Approaches for Phishing Detection
4.2. Technical Protection Methods for Email Security
4.3. Organizational Measures: User Awareness and Training
4.4. Multi-Factor Authentication (MFA) Measure
4.5. Cross-Method Effectiveness
4.6. Comparative Evaluation Table
5. Discussion
6. Conclusion
- early detection and filtering (ML + DMARC/SPF/DKIM),
- reduction of human error (continuous training and simulations),
- robust authentication (phishing-resistant MFA),
- regular auditing and updating of all components.
References
- Robert Abill, Ahsun Adaan, and Elly Billy. Investigating the effectiveness of multi-factor authentication against financial fraud, 25. 20 January.
- APAC Insider. The evolution of online fraud and how to stay safe, 2024.
- Applied Research. Phishing research paper, 2023.
- Certified Senders Alliance. Protection contre le phishing: DMARC & RGPD sontils compatibles?, 2018.
- Finscore. Types of online fraud, n.d.
- Fortinet. Types of phishing attacks, n.d.
- Mohamed Gori, J. Visumathi, Miroslav Mahdal, Jose Anand, and Muniyandy Elangovan. An effective and secure mechanism for phishing attacks using a machine learning approach. Processes 2022, 10, 1356. [CrossRef]
- Hostragons Global Limited. Protection from phishing attacks: Organizational and technical measures, 2025.
- J. Jason. History of phishing: A deep dive into its global impact, n.d.
- Microsoft. Protect yourself from phishing, n.d.
- Muhammad Raza. What is a watering hole attack? Detection and prevention, 2025.
- Rajendra Rushanth. From call to compromise: Darktrace’s response to a vishing-induced network attack, 2024.
- Brad Slavin. A roundup of the top phishing attacks in 2024 so far, 2024.
| Protection Method | Effectiveness | Scalability | Limitations / Risks |
|---|---|---|---|
| Machine Learning Approaches for Phishing Detection | High detection ac- curacy; adaptive to new patterns | High in au- tomated en- vironments; dependent on infrastructure | Susceptible to adver- sarial evasion; per- formance drops with data drift |
| Technical Protec- tion (DMARC, SPF, DKIM) | Strong against spoofing and unau- thorized domain use | Very high once deployed | Misconfiguration re- duces effectiveness; ineffective against phishing from legiti- mate domains |
| Organizational Measures (Train- ing, Awareness) | Moderate; im- proves recognition and reduces errors over time | Medium; effectiveness varies across individuals | Human error persists; performance declines without reinforce- ment; vulnerable to sophisticated social engineering |
| Multi-Factor Au- thentication (MFA) | Very high for pre- venting account compromise | High in most organizations | Susceptible to SIM swap and real-time phishing; user resis- tance to adoption |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).