DAFPD: The Dynamic and Adaptive Framework for Enhanced Phishing Detection Techniques

Authors

  • Sudhir Kumar Gupta Lakshmibai College, University of Delhi, Ashok Vihar Phase III, Delhi, India https://orcid.org/0009-0005-6514-8713
  • Sangeeta Srivastava Bhaskaracharya College of Applied Science, University of Delhi, Sector 2, Dwarka, Delhi, India https://orcid.org/0000-0003-1265-029X
  • Vandana Gandotra Ram Lal Anand College, University of Delhi, South Campus, Anand Niketan, Delhi, India
Volume: 16 | Issue: 1 | Pages: 31028-31034 | February 2026 | https://doi.org/10.48084/etasr.12487

Abstract

This study introduces the Dynamic and Adaptive Framework for Enhanced Phishing Detection (DAFPD) that uses multi-stage machine learning and deep learning for real-time, explainable phishing detection. DAFPD captures dynamic features (lexical, host-based, content-based, graph-based) and uses transformer models (BERT, RoBERTa) and Graph Neural Networks (GNNs) to accurately contextualize information. Python and Anaconda with PhishTank live dataset were used to perform these experiments. The detection pipeline consists of a light-weight heuristic filter, a deep learning phase with the combination of CNN-LSTM and transformers, and an ensemble learning aided with autoencoder-based zero-day attack anomaly detectors. For on-chain transactions, reinforcement learning (Deep Q-Networks) automatically determines thresholds and features. Explainable AI techniques, such as SHapley Additive exPlanations (SHAP) and Local Interpretable Model-agnostic Explanations (LIME), provide justifications of the model predictions. Enabling cloud services with an "as a service" implementation, DAFPD communicates with Security Information and Event Management (SIEM) to block threats as they occur. The experimental results demonstrate that the DAFPD achieves significantly better performance.

Keywords:

phishing detection, machine learning, Graph Neural Networks (GNNs), anomaly detection, reinforcement learning

Downloads

Download data is not yet available.

References

R. K. Ayeni, A. A. Adebiyi, J. O. Okesola, and E. Igbekele, "Phishing Attacks and Detection Techniques: A Systematic Review," in 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals, Omu-Aran, Nigeria, Apr. 2024, pp. 1–17. DOI: https://doi.org/10.1109/SEB4SDG60871.2024.10630203

M. Schmitt and I. Flechais, "Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing," Artificial Intelligence Review, vol. 57, no. 12, Oct. 2024, Art. no. 324. DOI: https://doi.org/10.1007/s10462-024-10973-2

M. Nanda, M. Saraswat, and P. K. Sharma, "Enhancing Cybersecurity: A Review and Comparative Analysis of Convolutional Neural Network Approaches for Detecting URL-based Phishing Attacks," e-Prime - Advances in Electrical Engineering, Electronics and Energy, vol. 8, June 2024, Art. no. 100533. DOI: https://doi.org/10.1016/j.prime.2024.100533

A. Darem, "Anti-Phishing Awareness Delivery Methods," Engineering, Technology & Applied Science Research, vol. 11, no. 6, pp. 7944–7949, Dec. 2021. DOI: https://doi.org/10.48084/etasr.4600

S. K. Gupta, S. Srivastava, and V. Gandotra, "SMISHBAN: Framework for Detecting SMSHING SMS and Phishing Email Using Machine Learning Algorithms," in Innovative Computing and Communications, vol. 1435, A. E. Hassanien, S. Anand, A. Jaiswal, and P. Kumar, Eds. Singapore: Springer Nature Singapore, 2025, pp. 289–301. DOI: https://doi.org/10.1007/978-981-96-6906-6_20

"Phishing Activity Trends Reports," Anti-Phishing Working Group, Mar. 2025. https://apwg.org/trendsreports/.

A. K. Jain and B. B. Gupta, "A Novel Approach to Protect Against Phishing Attacks at Client Side Using Auto-updated White-list," EURASIP Journal on Information Security, vol. 2016, no. 1, Dec. 2016, Art. no. 9. DOI: https://doi.org/10.1186/s13635-016-0034-3

A. A. Akinyelu and A. O. Adewumi, "Classification of Phishing Email Using Random Forest Machine Learning Technique," Journal of Applied Mathematics, vol. 2014, pp. 1–6, 2014. DOI: https://doi.org/10.1155/2014/425731

M. Karthick Kumar and N. Sivakumar, "URL Phishing Attack Detection using Machine Learning Algorithms," in 2024 OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, Raigarh, India, June 2024, pp. 1–8. DOI: https://doi.org/10.1109/OTCON60325.2024.10687804

M. A. Uddin and I. H. Sarker, "An Explainable Transformer-Based Model for Phishing Email Detection: A Large Language Model Approach." SSRN PrePrint, 2024. DOI: https://doi.org/10.2139/ssrn.4785953

G. Karat, J. M. Kannimoola, N. Nair, A. Vazhayil, V. G. Sujadevi, and P. Poornachandran, "CNN-LSTM Hybrid Model for Enhanced Malware Analysis and Detection," Procedia Computer Science, vol. 233, pp. 492–503, 2024. DOI: https://doi.org/10.1016/j.procs.2024.03.239

S. Ratra, M. Ghosh, N. Baliyan, J. Rashmitha Mohan, and S. Singh, "Graph Neural Network Based Phishing Account Detection in Ethereum," The Computer Journal, vol. 67, no. 12, pp. 3160–3168, Dec. 2024. DOI: https://doi.org/10.1093/comjnl/bxae079

S. Fan, H. Xu, S. Fu, Y. Luo, and M. Xu, "Edge-feature Modeling-based Topological Graph Neural Networks for Phishing Scams Detection on Ethereum," in 2024 IEEE/ACM 32nd International Symposium on Quality of Service, Guangzhou, China, June 2024, pp. 1–10. DOI: https://doi.org/10.1109/IWQoS61813.2024.10682857

H. Kamal, S. Gautam, D. Mehrotra, and M. S. Sharif, "Reinforcement Learning Model for Detecting Phishing Websites," in Cybersecurity and Artificial Intelligence, H. Jahankhani, G. Bowen, M. S. Sharif, and O. Hussien, Eds. Cham, Switzerland: Springer Nature Switzerland, 2024, pp. 309–326. DOI: https://doi.org/10.1007/978-3-031-52272-7_13

S. K. Birthriya, P. Ahlawat, and A. K. Jain, "Phishing URL Detection using Deep Q-Networks with Convolutional Neural Networks," in 2024 International Conference on Intelligent Systems for Cybersecurity, Gurugram, India, May 2024, pp. 1–6. DOI: https://doi.org/10.1109/ISCS61804.2024.10581203

D. Gaspar, P. Silva, and C. Silva, "Explainable AI for Intrusion Detection Systems: LIME and SHAP Applicability on Multi-Layer Perceptron," IEEE Access, vol. 12, pp. 30164–30175, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3368377

S. K. Gupta, "Experimental Dataset." GitHub, Nov. 2025, [Online]. Available: https://github.com/ProfSudhir/experimental-dataset.

A. A. Albishri and M. M. Dessouky, "A Comparative Analysis of Machine Learning Techniques for URL Phishing Detection," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18495–18501, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8920

Downloads

How to Cite

[1]
S. K. Gupta, S. Srivastava, and V. Gandotra, “DAFPD: The Dynamic and Adaptive Framework for Enhanced Phishing Detection Techniques”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 31028–31034, Feb. 2026.

Metrics

Abstract Views: 185
PDF Downloads: 107

Metrics Information