Development of Ensemble SVM–LSTM Model for Phishing Website Detection
- Authors
-
-
Abubakar L. IBRAHEEM
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
John K. ALHASSAN
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Noel D. MOSES
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Suleiman AHMAD
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
- Keywords:
- Phishing, Cybercrime, Cyber Threats, Identity theft, Ensemble Learning.
- Abstract
-
Phishing is a criminal mechanism employing social engineering techniques to exploit human vulnerabilities and technical loopholes. This is to deceive users into divulging sensitive information, which are in turn used for fraudulent activities. Meanwhile, many machine learning approaches have been proposed in the literature, they often struggle with scalability, adaptability to emerging threats and the trade-off between detection accuracy and computational efficiency. This study aims to enhance phishing website detection through the implementation of an ensemble model that integrate Support Vector Machine (SVM) and Long Short-Term Memory (LSTM) networks. The methodology involves collecting a diverse dataset of phishing and legitimate URLs with a total of 343,525 records. This includes phishing URLs downloaded in CSV file format from PhishTank and Kaggle comprising a total of 167,582 records and legitimate URLs downloaded from the UC Irvine Machine Learning Repository and Kaggle consisting of 175,943 records. Static and Sequential features were extracted. 49 features were extracted and 15 were selected as the most relevant features using Recursive Feature Elimination (RFE) and univariate statistical tests. An ensemble architecture integrating SVM and LSTM networks was then trained using the selected features, employing stratified k-fold cross-validation. The results demonstrate that the proposed approach achieves high detection accuracy of 97.58%, precision 93.54%, recall 96.1% and F1- Score 95.78%, outperforming traditional models and various benchmark classifiers. The findings highlight the effectiveness of combining static and sequential features within an ensemble framework to improve the generalization and robustness of phishing detection systems. Exploring deep learning architectures like CNNs, LSTMs, and GANs in a hybrid framework will likely boost detection capabilities against evolving cyber threats.
- References
- Downloads
- Published
- 02-03-2026
- Section
- Articles
- License
-
Copyright (c) 2026 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Yusuf T. BAFFA, Muhammad Y. MUHAMMAD, Aliyu SHUAIBU, Enhanced Detection and Classification Models for Distributed Denial-of-Service Using Time-Based Features in Cybersecurity , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Damilare L. ADEKEYE, Uche M. IROKA, A Microcontroller-Based Intelligent Electricity Theft Detection and Prevention System , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Emma S. EKPO, Mokọ́ládé JOHNSON, Constructing Meaning and Enhancing Well-Being: The Role of Place Attachment, Place Identity, and Sense of Place in Architectural Studio Environments , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Caleb A. ABORISADE, Jide E.T. AKINSOLA, Ifeoluwa M. OLANIYI, Fathia O. ONIPEDE, Emmanuel A. OLAJUBU, Ganiyu A. ADEROUNMU, Machine Learning-Based Polycystic Ovary Syndrome Generative Modelling via Ensemble Learning and Neural Networks for Infertility Prediction , FUDMA Journal of Engineering and Technology: Vol. 1 No. 1 (2025): July 2025
- Oluwasanmi S. ADANIGBO, Opeyemi O. ASAOLU, Adedayo A. SOBOWALE, Temidayo AKINDAHUNSI, Akinbayode A. ASAOLU, Intrusion Detection in Mobile Adhoc Networks: A Review of Signature-Based, Anomaly-Based, and Hybrid Approaches , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Ukange N. SYBIL, Hadiza A. UMAR, Ogar M. OKO, Habeebah A. KAKUDI, Usman MAHMUD, Alex AARON, Leveraging Quantum Machine Learning for Early Ovarian Cancer Diagnosis , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olatunde A. AKANO, Wariz A. ISMAEL, Ayomikun A. AWOSEYI, Femi AYO, Ifeoluwa M. OLANIYI, Jide E.T. AKINSOLA, Short Messaging Service Spam Detection Model Using Natural Language Processing and Deep Learning Techniques , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Usman A. ABDURRAHMAN, Abubakar A. ROGO, Abdulkadir A. BICHI, Akibu M. ABDULLAHI, Beyond Overload: Assessing Cognitive Load to Facilitate Learning Transfer in Virtual Environments , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Shamsuddeen J. AHMAD, Saifullahi S. SADI, Muhammad M. AHMAD, Abdullahi D. UMAR, Shamsuddeen USMAN, Comparative Analysis of Machine Learning Algorithms for the Detection and Classification of Suspicious Emails , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Lukman MOHAMMED, Victor O. WAZIRI, Ismaila IDRIS, Suleiman AHMAD, Performance Assessment of Android Antimalware Applications: An Experimental Approach , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
