WillRo: A Deep Learning App for Potential Phishing Threat Detection
Received: 19 August 2025 | Revised: 22 September 2025 and 11 October 2025 | Accepted: 13 October 2025 | Online: 8 December 2025
Corresponding author: Sandra Wong-Durand
Abstract
This article presents an application called WillRo App, designed to detect potential phishing by analyzing website screenshots in real time. The system integrated Robotic Process Automation (RPA) to capture screenshots, and the YOLOv5 deep learning model in order to classify phishing and no-phishing content. The results demonstrated a precision of 85.80%, a recall of 93.00%, a mAP@0.5 of 66.60%, and a mAP@0.5 -0.95 of 32.70%. These values showed a reliable detection performance, making WillRo a possible model for phishing detection. Future work should focus on improving the model with additional features to increase its accuracy.
Keywords:
phishing detection, deep learning, malicious content, Robotic Process Automation (RPA)Downloads
References
"2024 Data Breach Investigations Report," Verison Business, Ashburn, VR, USA, 2024.
J. Rios. "Student emails are being used to spread fake news." Infobae, https://www.infobae.com/tecno/2023/10/21/correos-electronicos-de-los-estudiantes-son-usados-para-propagar-mensajes-falsos/.
A. H. Aljammal, S. Taamneh, A. Qawasmeh, and H. B. Salameh, "Machine Learning Based Phishing Attacks Detection Using Multiple Datasets.," International Journal of Interactive Mobile Technologies, vol. 17, no. 5, Mar. 2023, Art. no. 71. DOI: https://doi.org/10.3991/ijim.v17i05.37575
U. A. Butt, R. Amin, H. Aldabbas, S. Mohan, B. Alouffi, and A. Ahmadian, "Cloud-based email phishing attack using machine and deep learning algorithm," Complex & Intelligent Systems, vol. 9, no. 3, pp. 3043–3070, 2023. DOI: https://doi.org/10.1007/s40747-022-00760-3
A. K. Jain, N. Debnath, and A. K. Jain, "APuML: An Efficient Approach to Detect Mobile Phishing Webpages using Machine Learning," Wireless Personal Communications, vol. 125, no. 4, pp. 3227–3248, May 2022. DOI: https://doi.org/10.1007/s11277-022-09707-w
S. Das Guptta, K. T. Shahriar, H. Alqahtani, D. Alsalman, and I. H. Sarker, "Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques," Annals of Data Science, vol. 11, no. 1, pp. 217–242, Feb. 2024. DOI: https://doi.org/10.1007/s40745-022-00379-8
A. Ozcan, C. Catal, E. Donmez, and B. Senturk, "A hybrid DNN–LSTM model for detecting phishing URLs," Neural Computing and Applications, vol. 35, no. 7, pp. 4957–4973, 2023. DOI: https://doi.org/10.1007/s00521-021-06401-z
N. Nagy et al., "Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis," Sensors, vol. 23, no. 7, Mar. 2023, Art. no. 3467. DOI: https://doi.org/10.3390/s23073467
S.-S. Shin, S.-G. Ji, and S.-S. Hong, "A Heterogeneous Machine Learning Ensemble Framework for Malicious Webpage Detection," Applied Sciences, vol. 12, no. 23, Nov. 2022, Art. no. 12070. DOI: https://doi.org/10.3390/app122312070
D. M. Linh, H. D. Hung, H. M. Chau, Q. S. Vu, and T.-N. Tran, “Real-time phishing detection using deep learning methods by extensions,” International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, pp. 3021–3035, June 2024. DOI: https://doi.org/10.11591/ijece.v14i3.pp3021-3035
O. K. Sahingoz, E. BUBEr, and E. Kugu, "DEPHIDES: Deep Learning Based Phishing Detection System," IEEE Access, vol. 12, pp. 8052–8070, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3352629
M. Elsadig et al., "Intelligent Deep Machine Learning Cyber Phishing URL Detection Based on BERT Features Extraction," Electronics, vol. 11, no. 22, Nov. 2022, Art. no. 3647. DOI: https://doi.org/10.3390/electronics11223647
M. Sam’an and K. Imaddudin, "Hybrid deep learning model for YouTube spam comment detection," International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, pp. 3313–3319, June 2024. DOI: https://doi.org/10.11591/ijece.v14i3.pp3313-3319
S. Aslam, H. Aslam, A. Manzoor, H. Chen, and A. Rasool, "AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection," Symmetry, vol. 16, no. 2, Feb. 2024, Art. no. 248. DOI: https://doi.org/10.3390/sym16020248
S. A. Mohamed, M. A. Mahmoud, M. N. Mahdi, and S. A. Mostafa, "Improving Efficiency and Effectiveness of Robotic Process Automation in Human Resource Management," Sustainability, vol. 14, no. 7, Mar. 2022, Art. no. 3920. DOI: https://doi.org/10.3390/su14073920
B. Vajgel et al., "Development of Intelligent Robotic Process Automation: A Utility Case Study in Brazil," IEEE Access, vol. 9, pp. 71222–71235, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3075693
M. Yao, "RPA Technology Enables Highly Automated Development of Corporate Financial Accounting Processes," Applied Mathematics and Nonlinear Sciences, vol. 9, no. 1, 2024, Art. no. 20240541. DOI: https://doi.org/10.2478/amns-2024-0541
S. Cho, J. Moon, J. Bae, J. Kang, and S. Lee, "A Framework for Understanding Unstructured Financial Documents Using RPA and Multimodal Approach," Electronics, vol. 12, no. 4, Feb. 2023, Art. no. 939. DOI: https://doi.org/10.3390/electronics12040939
D. Choi, H. R’bigui, and C. Cho, "Candidate Digital Tasks Selection Methodology for Automation with Robotic Process Automation," Sustainability, vol. 13, no. 16, Aug. 2021, Art. no. 8980. DOI: https://doi.org/10.3390/su13168980
I. Skula and M. Kvet, "A Framework for Preparing a Balanced and Comprehensive Phishing Dataset," IEEE Access, vol. 12, pp. 53610–53622, Apr. 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3387437
A. A. Albishri and M. M. Dessouky, "A Comparative Analysis of Machine Learning Techniques for URL Phishing Detection," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18495–18501, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8920
L. S. H. Colin, P. M. Mohan, J. Pan, and P. L. K. Keong, "An Integrated Smart Contract Vulnerability Detection Tool Using Multi-Layer Perceptron on Real-Time Solidity Smart Contracts," IEEE Access, vol. 12, pp. 23549–23567, Feb. 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3364351
W. Wang, J. Song, G. Xu, Y. Li, H. Wang, and C. Su, "ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts," IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1133–1144, 2021. DOI: https://doi.org/10.1109/TNSE.2020.2968505
Y. A. Alsariera, M. H. Alanazi, Y. Said, and F. Allan, "An Investigation of AI-Based Ensemble Methods for the Detection of Phishing Attacks," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14266–14274, June 2024. DOI: https://doi.org/10.48084/etasr.7267
Kaggle, https://www.kaggle.com/.
Phish-Iris Dataset.
Counterfeit Affiliate Programs (CAP).
Phishing dataset.
"Train YOLOv5 on custom data." Ultralytics.
"Performance Metrics Deep Dive." Ultralytics,.
Downloads
How to Cite
License
Copyright (c) 2025 Willy Sotelo, Alvaro Roque, Sandra Wong-Durand, Pedro Castaneda, Alejandra Onate-Andino

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
