RESTUS -REAL-WORLD AI/ML-BASED PHISHING DETECTION AND PREVENTION SYSTEM
These days, phishing scams grow sharper, using clever tricks to fool people and slip past standard security checks. Old methods like blocking known hazardous sites or applying fixed rules struggle when facing fresh, changing dangers. To tackle this problem, the study introduces RESTUS—a mix of smart tools powered by artificial intelligence combining CNNs, LSTMs, and LightGBM working together.
One way this setup works involves pulling out features in layers—mixing how things are built, where they come from, and what they contain—to get better results when sorting data. On top of that, RESTUS uses methods that show why decisions happen, helping people understand and rely on its output. The API structure, designed for growth and paired with a responsive front layer, enables live threat spotting. Tests reveal it handles tasks more effectively than older or isolated models ever did, fitting well into today’s security demands.
Thange, P., Jadhav, J. & Apte, A. (2026). Restus -Real-World AI/ML-Based Phishing Detection and Prevention System. International Journal of Science, Strategic Management and Technology, 02(04). https://doi.org/10.55041/ijsmt.v2i4.316
Thange, Priyanka, et al.. "Restus -Real-World AI/ML-Based Phishing Detection and Prevention System." International Journal of Science, Strategic Management and Technology, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i4.316.
Thange, Priyanka,Janhavi Jadhav, and Amit Apte. "Restus -Real-World AI/ML-Based Phishing Detection and Prevention System." International Journal of Science, Strategic Management and Technology 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i4.316.
- K. Sospeter, A. Nugroho, and R. Hidayat,
“AI-Based Phishing Attack Detection and Prevention Using Natural Language Processing,”
Proc. IC-ITECHS, 2024.
[2] O. A. Lamina, A. O. Adewumi, and M. A. Adebayo,
“AI-Powered Phishing Detection and Prevention: A Real-World Perspective,”
Path of Science, vol. 11, no. 2, pp. 101–115, 2025.
[3] H. Jabbar and S. Al-Janabi,
“An AI-Driven Reinforcement Learning Framework for Phishing Detection,”
Big Data and Cognitive Computing, vol. 5, no. 2, 2025.
[4] A. Agrawal, S. Verma, and R. Singh,
“Application of Machine Learning for Real-Time Phishing Attack Detection,”
JETIA, vol. 11, no. 1, pp. 45–52, 2025.
[5] S. Rehman, M. A. Khan, and T. Hussain,
“Real-Time Phishing URL Detection Using Machine Learning,”
Engineering Proceedings, vol. 107, no. 1, 2025.
[6] P. Shelke, R. Patil, and S. Pawar,
“Defending Future Phishing Website Assaults Using Machine Learning Algorithms,”
IJISAE, vol. 12, no. 3, pp. 233–241, 2024.
[7] R. S. Dhole, A. Kulkarni, and S. Jadhav,
“AI-Powered Phishing Attack Detection Using Deep Learning,”
IJARCCE, vol. 14, no. 1, 2025.
[8] M. A. Rahman et al.,
“Artificial Intelligence Techniques for Phishing Detection: A Review,”
Frontiers in Artificial Intelligence, vol. 8, 2025.
[9] Y. Chen, L. Zhang, and D. Wang,
“Feature Reliability in Phishing URL Detection,”
Proc. ACM AsiaCCS, 2025.
[10] A. Al-Qasmi, M. Al-Shabi, and H. Al-Balushi,
“Machine Learning-Based Phishing Detection Using Random Forest,”
IJISAE, vol. 12, no. 4, 2024