Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Detecting Phishing Websites Using Natural Language Processing

Dr. Sherif Kamel Hussein, Dr. Aboubaker Wahballah, Mrs. Amal Alosaimi, ,
Arab East College for graduate studies - Riyadh - KSA ( and) October University for Modern Sciences and Arts - Giza - Egypt

Phishing is one of the most cyber attacking tools. It targets both users and organizations. Several solutions have been proposed for detecting and preventing phishing websites, emails and SMSs. However, more research works are required to improve the phishing detection techniques such as improving the detection scalability and reducing false positive and negative alerts. This paper proposes a website phishing detection system based on natural language processing (NLP) features such as statements, words, and characters frequency. The proposed system first enables any user to find out if a specific website is phishing or not and, second, provides a search engine that 24/7 searches for the phishing websites and informs the system administrator (or publishes alerts online) about that. The system is evaluated in terms of its scalability and accuracy. The system accuracy here relies on the number of false-positive, false negative, true positive, and true negative alerts.

Dr. Sherif Kamel Hussein,Dr. Aboubaker Wahballah,Mrs. Amal Alosaimi."Detecting Phishing Websites Using Natural Language Processing". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.8, Issue 12,pp.220-227, December- 2021, URL :,

Keywords : Attacks, Natural language processing (NLP), Phishing, Scalability, Website, Information and communication technologies (ICTs

[1]. 	Verma, R., Shashidhar, N., & Hossain, N. , “Detecting Phishing Emails the Natural Language Way”,Computer Security–ESORICS 2012, 824-841.
[2]. 	Patil, P.; Devale, P. “A literature survey of phishing attack technique”, Int. J. Adv. Res. Comput. Commun. Eng. 2016, 5, 198–200. 17.
[3]. 	Rakesh M. Verma and Nabil Hossain. “Semantic feature selection for text with application to phishing email detection”, InProc. 16th International Conference on Information Security and Cryptology ICISC, Revised Selected Papers, pages 455–468. Springer, 2013.
[4]. 	R. M. Mohammad, F. Thabtah, L. McCluskey, “Tutorial and critical analysis of phishing websites methods,”, Computer Science Review, vol. 17, pp. 1-24, 2015.
[5]. 	Kang-Leng Chiew , Kelvin S. C. Yong , Choon Lin Tan:” A survey of phishing attacks: Their types, vectors and technical approaches”, Expert Syst. Appl,106: 1-20
[6]. 	Rakesh Verma, Narasimha Shashidhar, and Nabil Hossain, “Detecting phishing emails the natural language way”. European Symposium on Research in Computer Security, pages 824–841. Springer, 2012.
[7]. 	J. Kang and D. Lee, “Advanced white list approach for preventing access to phishing sites,”, Proc. International Conference on Convergence Information Technology (ICCIT 2007), pp.491-496, 2007.
[8]. 	Y. Cao, W. Han, and Y. Le, ?”Anti-phishing based on automated individual white-list”, Proceedings of the 4th ACM workshop on Digital identity management. New York, NY, USA: ACM, 2008, pp. 51–60.
[9]. 	M. Sharifi and S. H. Siadati, “A phishing sites blacklist generator,” , IEEE/ACS International Conference on Computer Systems and Applications, pp. 840-843, 2008.
[10]. 	P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, “Phishnet: predictive blacklisting to detect phishing attacks,”, Proc. IEEE INFOCOM, 2010, pp.1-5, 2010.
[11]. 	Ardi C, Heidemann J , Auntietuna: “personalized content-based phishing detection”, NDSS usable security workshop (USEC).
[12]. 	Hongming Che, Qinyun Liu, Lin Zou, Hongji Yang, Dongdai Zhou, Feng Yu, “A Content-Based Phishing Email Detection Method”, QRS Companion 2017: 415-422
[13]. 	Peng, T., Harris, I. and Sawa, Y.,” Detecting phishing attacks using natural language processing and machine learning”, IEEE 12th International 

Conference on Semantic Computing (ICSC) (pp. 300-301), 2018.
[14]. 	Egozi, G. and Verma, R., “Phishing Email Detection Using Robust NLP Techniques”, IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 7-12),  November 2018.
[15]. 	L. Wenyin, G. Huang, L. Xiao Yue, Z. Min, X. Deng, “Detection of phishing webpages based on visual similarity,”, Special interest tracks and posters of the 14th International Conference on World Wide Web, pp. 1060-1061, 2005.
[16]. 	Y. Fu, L. Wenyin and X. Deng, "Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)," , IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 301-311, 2006.

DOI Link :

Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal