Development of Generative Adversarial Network-Based Algorithms for Real-Time Phishing URL Detection in Adversarial Cyber Threat Scenarios

Authors

  • Jamila Maryam Zahra Computer Forensic Analyst Author

Keywords:

Phishing Detection, Generative Adversarial Networks (GANs), Adversarial Machine Learning, Cybersecurity, URL Classification, Real-Time Threat Detection

Abstract

Phishing attacks continue to be a major cybersecurity threat, especially as adversaries increasingly deploy obfuscation and evasion strategies. Traditional detection methods—rule-based systems or standard machine learning classifiers—struggle to keep pace with the dynamic nature of phishing URLs. This study proposes a novel Generative Adversarial Network (GAN)-based architecture to detect phishing URLs in real-time, specifically under adversarial conditions. The model leverages a generator to simulate sophisticated phishing URLs and a discriminator trained to detect them. Evaluation across benchmark phishing datasets and adversarially generated URLs demonstrates that the proposed GAN-based model significantly outperforms baseline machine learning techniques in both precision and recall, offering robustness against evasion attempts. This work represents a pivotal advancement in automated, adversarially-resilient cyber threat mitigation strategies.

References

Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572.

Kodi, D., & Chundru, S. (2025). Unlocking New Possibilities: How Advanced API Integration Enhances Green Innovation and Equity. In Advancing Social Equity Through Accessible Green Innovation (pp. 24). IGI Global. https://doi.org/10.4018/979-8-3693-9471-7.ch027

Ilyas, A., Engstrom, L., Athalye, A., & Lin, J. (2020). Adversarial examples are not bugs, they are features. Advances in Neural Information Processing Systems, 33.

Marella, B.C.C., & Kodi, D. (2025). Generative AI for Fraud Prevention: A New Frontier in Productivity and Green Innovation. In Advancing Social Equity Through Accessible Green Innovation (pp. 1–16). IGI Global. https://doi.org/10.4018/979-8-3693-9471-7.ch012

Lin, Y., Wang, S., & Zhang, H. (2022). GAN-based adversarial URL generation for phishing detection. Journal of Cybersecurity Research, 11(2), 45–57.

Marchal, S., Saari, K., Singh, N., & Asokan, N. (2017). Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets. IEEE Transactions on Dependable and Secure Computing, 15(4), 626–639.

K. R. Kotte, L. Thammareddi, D. Kodi, V. R. Anumolu, A. K. K and S. Joshi, "Integration of Process Optimization and Automation: A Way to AI Powered Digital Transformation," 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), Bhimtal, Nainital, India, 2025, pp. 1133-1138, doi: 10.1109/CE2CT64011.2025.10939966.

Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine learning-based phishing detection from URLs. Expert Systems with Applications, 117, 345–357.

Alauthman, M., Binsalleeh, H., Mahmoud, Q. H., & Tolba, A. (2020). A novel dataset for phishing websites detection using URL-based features. Procedia Computer Science, 170, 620–627. https://doi.org/10.1016/j.procs.2020.03.128

Kodi, D. (2024). Automating Software Engineering Workflows: Integrating Scripting and Coding in the Development Lifecycle . Journal of Computational Analysis and Applications (JoCAAA), 33(4), 635–652.

Zhang, J., & Luo, X. (2021). Detecting phishing websites using deep learning: A survey. Neurocomputing, 418, 387–399.

Chen, Y., Yang, W., & Yang, J. (2021). A novel adversarial training strategy for deep phishing detection. Computers & Security, 109, 102384.

Ferdous, M. S., Biswas, M. R., & Watters, P. (2022). Adversarial attacks and defenses in malware detection systems: A survey. ACM Computing Surveys, 55(4), 1–38.

Huda, S., Abawajy, J., Alazab, M., Islam, R., & Yearwood, J. (2018). A malicious threat detection model for cloud assisted Internet of Things (IoT) framework. Future Generation Computer Systems, 91, 127–141.

Kodi, D. (2024). Data Transformation and Integration: Leveraging Talend for Enterprise Solutions. International Journal of Innovative Research in Science, Engineering and Technology, 13(9), 16876–16886. https://doi.org/10.15680/IJIRSET.2024.1309124

Kurakin, A., Goodfellow, I., & Bengio, S. (2017). Adversarial machine learning at scale. Proceedings of the 5th International Conference on Learning Representations (ICLR 2017).

Downloads

Published

2025-05-03

How to Cite

Jamila Maryam Zahra. (2025). Development of Generative Adversarial Network-Based Algorithms for Real-Time Phishing URL Detection in Adversarial Cyber Threat Scenarios. ISCSITR- INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE (ISCSITR-IJAI), 6(1), 68-75. https://iscsitr.in/index.php/ISCSITR-IJAI/article/view/ISCSITR-IJAI_2025_06_01_06