Submitted:
29 December 2025
Posted:
30 December 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Materials and Methods
2.1. Sample Description and Study Scope
2.2. Experimental Design and Control Setup
2.3. Measurement Procedures and Quality Control
2.4. Data Processing and Model Formulation
3. Results and Discussion
3.1. Overall detection performance
3.2. Early warning capability before blacklist appearance
3.3. Contribution of graph structure and relation types
3.4. Comparison with previous work and practical implications
4. Conclusion
References
- Kytidou, E.; Tsikriki, T.; Drosatos, G.; Rantos, K. Machine learning techniques for phishing detection: A review of methods, challenges, and future directions. Intelligent Decision Technologies 2025, 19(6), 4356–4379. [Google Scholar] [CrossRef]
- Gupta, B. B.; Tewari, A.; Jain, A. K.; Agrawal, D. P. Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications 2017, 28(12), 3629–3654. [Google Scholar] [CrossRef]
- Jakobsson, M.; Ramzan, Z. Crimeware: understanding new attacks and defenses; Addison-Wesley Professional, 2008. [Google Scholar]
- Bai, W. Phishing website detection based on machine learning algorithm. 2020 International Conference on Computing and Data Science (CDS), 2020, August; ieee; pp. 293–298. [Google Scholar]
- Ghalechyan, H.; Israyelyan, E.; Arakelyan, A.; Hovhannisyan, G.; Davtyan, A. Phishing URL detection with neural networks: an empirical study. Scientific reports 2024, 14(1), 25134. [Google Scholar] [CrossRef] [PubMed]
- Luo, D.; Gu, J.; Qin, F.; Wang, G.; Yao, L. E-seed: Shape-changing interfaces that self drill. In Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology, 2020, October; pp. 45–57. [Google Scholar]
- Bipasha, S. Literature Survey of Image Forgery Detection Using Machine Learning; 2025. [Google Scholar]
- Tan, L.; Liu, X.; Liu, D.; Liu, S.; Wu, W.; Jiang, H. An Improved Dung Beetle Optimizer for Random Forest Optimization. 2024 6th International Conference on Frontier Technologies of Information and Computer (ICFTIC), 2024, December; IEEE; pp. 1192–1196. [Google Scholar]
- Khalil, I.; Yu, T.; Guan, B. Discovering malicious domains through passive DNS data graph analysis. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016, May; pp. 663–674. [Google Scholar]
- Wang, Y.; Sayil, S. Soft Error Evaluation and Mitigation in Gate Diffusion Input Circuits. 2024 IEEE 6th International Conference on Power, Intelligent Computing and Systems (ICPICS), 2024, July; IEEE; pp. 121–128. [Google Scholar]
- Sakurai, Y.; Watanabe, T.; Okuda, T.; Akiyama, M.; Mori, T. Discovering HTTPSified phishing websites using the TLS certificates footprints. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020, September; IEEE; pp. 522–531. [Google Scholar]
- Yang, M.; Wu, J.; Tong, L.; Shi, J. Design of Advertisement Creative Optimization and Performance Enhancement System Based on Multimodal Deep Learning. 2025. [Google Scholar] [PubMed]
- Zhauniarovich, Y.; Khalil, I.; Yu, T.; Dacier, M. A survey on malicious domains detection through DNS data analysis. ACM Computing Surveys (CSUR) 2018, 51(4), 1–36. [Google Scholar] [CrossRef]
- Wu, C.; Chen, H. Research on system service convergence architecture for AR/VR system. 2025. [Google Scholar] [PubMed]
- Chen, H.; Ning, P.; Li, J.; Mao, Y. Energy Consumption Analysis and Optimization of Speech Algorithms for Intelligent Terminals. 2025. [Google Scholar] [PubMed]
- Alshehri, S. M.; Sharaf, S. A.; Molla, R. A. Systematic Review of Graph Neural Network for Malicious Attack Detection. Information 2025, 16(6), 470. [Google Scholar] [CrossRef]
- Hu, W. Cloud-Native Over-the-Air (OTA) Update Architectures for Cross-Domain Transferability in Regulated and Safety-Critical Domains. 2025 6th International Conference on Information Science, Parallel and Distributed Systems, 2025, September. [Google Scholar]
- Squarcina, M.; Tempesta, M.; Veronese, L.; Calzavara, S.; Maffei, M. Can i take your subdomain? exploring {Same-Site} attacks in the modern web. 30th USENIX Security Symposium (USENIX Security 21), 2021; pp. 2917–2934. [Google Scholar]
- Su, X. Vision Recognition and Positioning Optimization of Industrial Robots Based on Deep Learning.
- Bradshaw, S.; DeNardis, L. Privacy by infrastructure: The unresolved case of the domain name system. Policy & Internet 2019, 11(1), 16–36. [Google Scholar] [CrossRef]
- Feng, H. Design of Intelligent Charging System for Portable Electronic Devices Based on Internet of Things (IoT). 2024 5th International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), 2024, October; IEEE; pp. 568–571. [Google Scholar]


Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).