IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

PHISHVISION: A DUAL-LAYER PHISHING DETECTION SYSTEM USING MACHINE LEARNING AND COMPUTER VISION

AUTHORS:
Subash. A
Mentor
Dr T.R Nisha Dayana
Affiliation

Department of Computer Science, Vels Institute of Science, Technology And Advanced Studies (VISTAS), Pallavaram, Tamil Nadu, India

CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

 Phishing attacks remain a critical cybersecurity challenge, targeting individuals and organizations by impersonating legitimate entities to steal sensitive information. Existing detection mechanisms, such as blacklist-based filtering and rule-based systems, are limited in their ability to identify newly generated or obfuscated phishing URLs. This paper proposes PhishVision, a dual-layer phishing detection framework that integrates machine learning-based URL analysis with computer vision-driven visual verification. The system is deployed as a real-time browser extension with a FastAPI backend for efficient processing. The first layer utilizes a Random Forest classifier trained on engineered URL features to predict phishing likelihood. The second layer employs Optical Character Recognition (OCR) to extract textual content from webpage screenshots and detect inconsistencies between claimed brand identities and actual domain names. A decision engine combines outputs from both layers to produce a final classification with confidence scores. Experimental results indicate that the proposed approach improves detection accuracy and robustness against visually deceptive phishing attacks, making it suitable for real-time applications.

Keywords
Article Metrics
Article Views
19
PDF Downloads
2
HOW TO CITE
APA

MLA

Chicago

Copy

A, S. (2026). Phishvision: A Dual-Layer Phishing Detection System using Machine Learning and Computer Vision. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.003

A, Subash.. "Phishvision: A Dual-Layer Phishing Detection System using Machine Learning and Computer Vision." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.003.

A, Subash.. "Phishvision: A Dual-Layer Phishing Detection System using Machine Learning and Computer Vision." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.003.

References
1.Verma and K. Dyer, “On the Character of URLs for Phishing Detection,” Proceedings of the ACM Conference, 2015.

2.Aburrous, M. A. Hossain, F. Thabatah, and K. Dahal, “Intelligent phishing detection system for e-banking using fuzzy data mining,” Expert Systems with Applications, 2010.

3.Marchal, J. Francois, R. State, and T. Engel, “Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application,” IEEE Transactions on Computers, 2016.

4.Google, “Google Safe Browsing,” [Online]. Available: https://safebrowsing.google.com

5.Netcraft, “Phishing Site Feed,” [Online]. Available: https://www.netcraft.com

6.Al-Sarem, M., et al. (2025). "Optimization of Ensemble Learning for Phishing Detection using Genetic Algorithms." Journal of Cyber Security Technology, 8(2), 1-29.

7.Breiman, L. (2001). "Random Forests." Machine Learning, 45(1), 5-32.

8.Fette, I., Sadeh, N., & Tomasic, A. (2007). "Learning to detect phishing emails." Proceedings of the 16th International Conference on World Wide Web.

9.Mohan, V. S., & Rakotoasimbahoaka, A. (2025). "Phishing URL Detection Using CNN-LSTM and Random Forest Classifier." Opast Publishing Group.

10.Sharief, M. Y., & Rani, V. U. (2025). "Detection of Phishing Website Using Machine Learning." International Journal for Research in Applied Science & Engineering Technology (IJRASET), 13(8), 107-111.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Design and Cost Analysis of RO Plant for Bullayya College
string(20) "D.V.V. Satyanarayana" Satyanarayana, D.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.258
NLP-Based Plagiarism Detection using Tf-IDF and Cosine Similarity System
string(14) "Aravind.L.Sino" Aravind.L.Sino,
(2026)
DOI: 10.55041/ijsmt.v2i5.005
Impact of Climate Change in the Business Environment
string(13) "Ananya Bansal" Bansal, A.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.229
Scroll to Top