WillRo: A Deep Learning App for Potential Phishing Threat Detection

Authors

  • Willy Sotelo Faculty of Information Systems Engineering, Universidad Peruana de Ciencias Aplicadas, San Isidro, Lima, Peru
  • Alvaro Roque Faculty of Information Systems Engineering, Universidad Peruana de Ciencias Aplicadas, San Isidro, Lima, Peru
  • Sandra Wong-Durand Faculty of Information Systems Engineering, Universidad Peruana de Ciencias Aplicadas, San Isidro, Lima, Peru https://orcid.org/0000-0002-6154-2124
  • Pedro Castaneda Faculty of Systems Engineering and Electrical Mechanics, Universidad Nacional Toribio Rodriguez de Mendoza, Amazonas, Peru https://orcid.org/0000-0003-1865-1293
  • Alejandra Onate-Andino Escuela Superior Politecnica de Chimborazo (ESPOCH), Riobamba, Ecuador
Volume: 15 | Issue: 6 | Pages: 30591-30598 | December 2025 | https://doi.org/10.48084/etasr.14161

Abstract

This article presents an application called WillRo App, designed to detect potential phishing by analyzing website screenshots in real time. The system integrated Robotic Process Automation (RPA) to capture screenshots, and the YOLOv5 deep learning model in order to classify phishing and no-phishing content. The results demonstrated a precision of 85.80%, a recall of 93.00%, a mAP@0.5 of 66.60%, and a mAP@0.5 -0.95 of 32.70%. These values showed a reliable detection performance, making WillRo a possible model for phishing detection. Future work should focus on improving the model with additional features to increase its accuracy.

Keywords:

phishing detection, deep learning, malicious content, Robotic Process Automation (RPA)

Downloads

Download data is not yet available.

References

"2024 Data Breach Investigations Report," Verison Business, Ashburn, VR, USA, 2024.

J. Rios. "Student emails are being used to spread fake news." Infobae, https://www.infobae.com/tecno/2023/10/21/correos-electronicos-de-los-estudiantes-son-usados-para-propagar-mensajes-falsos/.

A. H. Aljammal, S. Taamneh, A. Qawasmeh, and H. B. Salameh, "Machine Learning Based Phishing Attacks Detection Using Multiple Datasets.," International Journal of Interactive Mobile Technologies, vol. 17, no. 5, Mar. 2023, Art. no. 71. DOI: https://doi.org/10.3991/ijim.v17i05.37575

U. A. Butt, R. Amin, H. Aldabbas, S. Mohan, B. Alouffi, and A. Ahmadian, "Cloud-based email phishing attack using machine and deep learning algorithm," Complex & Intelligent Systems, vol. 9, no. 3, pp. 3043–3070, 2023. DOI: https://doi.org/10.1007/s40747-022-00760-3

A. K. Jain, N. Debnath, and A. K. Jain, "APuML: An Efficient Approach to Detect Mobile Phishing Webpages using Machine Learning," Wireless Personal Communications, vol. 125, no. 4, pp. 3227–3248, May 2022. DOI: https://doi.org/10.1007/s11277-022-09707-w

S. Das Guptta, K. T. Shahriar, H. Alqahtani, D. Alsalman, and I. H. Sarker, "Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques," Annals of Data Science, vol. 11, no. 1, pp. 217–242, Feb. 2024. DOI: https://doi.org/10.1007/s40745-022-00379-8

A. Ozcan, C. Catal, E. Donmez, and B. Senturk, "A hybrid DNN–LSTM model for detecting phishing URLs," Neural Computing and Applications, vol. 35, no. 7, pp. 4957–4973, 2023. DOI: https://doi.org/10.1007/s00521-021-06401-z

N. Nagy et al., "Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis," Sensors, vol. 23, no. 7, Mar. 2023, Art. no. 3467. DOI: https://doi.org/10.3390/s23073467

S.-S. Shin, S.-G. Ji, and S.-S. Hong, "A Heterogeneous Machine Learning Ensemble Framework for Malicious Webpage Detection," Applied Sciences, vol. 12, no. 23, Nov. 2022, Art. no. 12070. DOI: https://doi.org/10.3390/app122312070

D. M. Linh, H. D. Hung, H. M. Chau, Q. S. Vu, and T.-N. Tran, “Real-time phishing detection using deep learning methods by extensions,” International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, pp. 3021–3035, June 2024. DOI: https://doi.org/10.11591/ijece.v14i3.pp3021-3035

O. K. Sahingoz, E. BUBEr, and E. Kugu, "DEPHIDES: Deep Learning Based Phishing Detection System," IEEE Access, vol. 12, pp. 8052–8070, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3352629

M. Elsadig et al., "Intelligent Deep Machine Learning Cyber Phishing URL Detection Based on BERT Features Extraction," Electronics, vol. 11, no. 22, Nov. 2022, Art. no. 3647. DOI: https://doi.org/10.3390/electronics11223647

M. Sam’an and K. Imaddudin, "Hybrid deep learning model for YouTube spam comment detection," International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, pp. 3313–3319, June 2024. DOI: https://doi.org/10.11591/ijece.v14i3.pp3313-3319

S. Aslam, H. Aslam, A. Manzoor, H. Chen, and A. Rasool, "AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection," Symmetry, vol. 16, no. 2, Feb. 2024, Art. no. 248. DOI: https://doi.org/10.3390/sym16020248

S. A. Mohamed, M. A. Mahmoud, M. N. Mahdi, and S. A. Mostafa, "Improving Efficiency and Effectiveness of Robotic Process Automation in Human Resource Management," Sustainability, vol. 14, no. 7, Mar. 2022, Art. no. 3920. DOI: https://doi.org/10.3390/su14073920

B. Vajgel et al., "Development of Intelligent Robotic Process Automation: A Utility Case Study in Brazil," IEEE Access, vol. 9, pp. 71222–71235, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3075693

M. Yao, "RPA Technology Enables Highly Automated Development of Corporate Financial Accounting Processes," Applied Mathematics and Nonlinear Sciences, vol. 9, no. 1, 2024, Art. no. 20240541. DOI: https://doi.org/10.2478/amns-2024-0541

S. Cho, J. Moon, J. Bae, J. Kang, and S. Lee, "A Framework for Understanding Unstructured Financial Documents Using RPA and Multimodal Approach," Electronics, vol. 12, no. 4, Feb. 2023, Art. no. 939. DOI: https://doi.org/10.3390/electronics12040939

D. Choi, H. R’bigui, and C. Cho, "Candidate Digital Tasks Selection Methodology for Automation with Robotic Process Automation," Sustainability, vol. 13, no. 16, Aug. 2021, Art. no. 8980. DOI: https://doi.org/10.3390/su13168980

I. Skula and M. Kvet, "A Framework for Preparing a Balanced and Comprehensive Phishing Dataset," IEEE Access, vol. 12, pp. 53610–53622, Apr. 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3387437

A. A. Albishri and M. M. Dessouky, "A Comparative Analysis of Machine Learning Techniques for URL Phishing Detection," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18495–18501, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8920

L. S. H. Colin, P. M. Mohan, J. Pan, and P. L. K. Keong, "An Integrated Smart Contract Vulnerability Detection Tool Using Multi-Layer Perceptron on Real-Time Solidity Smart Contracts," IEEE Access, vol. 12, pp. 23549–23567, Feb. 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3364351

W. Wang, J. Song, G. Xu, Y. Li, H. Wang, and C. Su, "ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts," IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1133–1144, 2021. DOI: https://doi.org/10.1109/TNSE.2020.2968505

Y. A. Alsariera, M. H. Alanazi, Y. Said, and F. Allan, "An Investigation of AI-Based Ensemble Methods for the Detection of Phishing Attacks," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14266–14274, June 2024. DOI: https://doi.org/10.48084/etasr.7267

Kaggle, https://www.kaggle.com/.

Phish-Iris Dataset.

Counterfeit Affiliate Programs (CAP).

Phishing dataset.

"Train YOLOv5 on custom data." Ultralytics.

"Performance Metrics Deep Dive." Ultralytics,.

Downloads

How to Cite

[1]
W. Sotelo, A. Roque, S. Wong-Durand, P. Castaneda, and A. Onate-Andino, “WillRo: A Deep Learning App for Potential Phishing Threat Detection”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 30591–30598, Dec. 2025.

Metrics

Abstract Views: 208
PDF Downloads: 187

Metrics Information