IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

RESTUS -REAL-WORLD AI/ML-BASED PHISHING DETECTION AND PREVENTION SYSTEM

AUTHORS:
Priyanka Thange
Janhavi Jadhav
Amit Apte
Mentor
Prof. Priya Godse
Affiliation
Department of Engineering, Ajeenkya D.Y. Patil University, Pune, India.
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

These days, phishing scams grow sharper, using clever tricks to fool people and slip past standard security checks. Old methods like blocking known hazardous sites or applying fixed rules struggle when facing fresh, changing dangers. To tackle this problem, the study introduces RESTUS—a mix of smart tools powered by artificial intelligence combining CNNs, LSTMs, and LightGBM working together.


One way this setup works involves pulling out features in layers—mixing how things are built, where they come from, and what they contain—to get better results when sorting data. On top of that, RESTUS uses methods that show why decisions happen, helping people understand and rely on its output. The API structure, designed for growth and paired with a responsive front layer, enables live threat spotting. Tests reveal it handles tasks more effectively than older or isolated models ever did, fitting well into today’s security demands.

Keywords
Article Metrics
Article Views
14
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Thange, P., Jadhav, J. & Apte, A. (2026). Restus -Real-World AI/ML-Based Phishing Detection and Prevention System. International Journal of Science, Strategic Management and Technology, 02(04). https://doi.org/10.55041/ijsmt.v2i4.316

Thange, Priyanka, et al.. "Restus -Real-World AI/ML-Based Phishing Detection and Prevention System." International Journal of Science, Strategic Management and Technology, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i4.316.

Thange, Priyanka,Janhavi Jadhav, and Amit Apte. "Restus -Real-World AI/ML-Based Phishing Detection and Prevention System." International Journal of Science, Strategic Management and Technology 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i4.316.

References

  1. K. Sospeter, A. Nugroho, and R. Hidayat,
    “AI-Based Phishing Attack Detection and Prevention Using Natural Language Processing,”
    Proc. IC-ITECHS, 2024.


[2] O. A. Lamina, A. O. Adewumi, and M. A. Adebayo,
“AI-Powered Phishing Detection and Prevention: A Real-World Perspective,”
Path of Science, vol. 11, no. 2, pp. 101–115, 2025.

[3] H. Jabbar and S. Al-Janabi,
“An AI-Driven Reinforcement Learning Framework for Phishing Detection,”
Big Data and Cognitive Computing, vol. 5, no. 2, 2025.

[4] A. Agrawal, S. Verma, and R. Singh,
“Application of Machine Learning for Real-Time Phishing Attack Detection,”
JETIA, vol. 11, no. 1, pp. 45–52, 2025.

[5] S. Rehman, M. A. Khan, and T. Hussain,
“Real-Time Phishing URL Detection Using Machine Learning,”
Engineering Proceedings, vol. 107, no. 1, 2025.

[6] P. Shelke, R. Patil, and S. Pawar,
“Defending Future Phishing Website Assaults Using Machine Learning Algorithms,”
IJISAE, vol. 12, no. 3, pp. 233–241, 2024.

[7] R. S. Dhole, A. Kulkarni, and S. Jadhav,
“AI-Powered Phishing Attack Detection Using Deep Learning,”
IJARCCE, vol. 14, no. 1, 2025.

[8] M. A. Rahman et al.,
“Artificial Intelligence Techniques for Phishing Detection: A Review,”
Frontiers in Artificial Intelligence, vol. 8, 2025.

[9] Y. Chen, L. Zhang, and D. Wang,
“Feature Reliability in Phishing URL Detection,”
Proc. ACM AsiaCCS, 2025.

[10] A. Al-Qasmi, M. Al-Shabi, and H. Al-Balushi,
“Machine Learning-Based Phishing Detection Using Random Forest,”
IJISAE, vol. 12, no. 4, 2024
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Beyond Digitalization: Organizational and Technological Challenges Implementing Marketing 6.0 In India
string(21) "Dr.Sandip K.Nimbalkar" K.Nimbalkar, D.
(2026)
DOI: 10.55041/ijsmt.v2i2.017
Credit Card Fraud Detection using Blockchain and Grassmann Algorithm
string(9) "Saffana M" M, S.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.276
The Financial Impact of Generative Artificial Intelligence in Hyper-ersonalised Marketing Campaigns: Challenges and Opportunities
string(13) "Mayank Pandey" Pandey, M.
(2026)
DOI: 10.55041/ijsmt.v2i3.432
Scroll to Top