Development of Ensemble SVM–LSTM Model for Phishing Website Detection
- Authors
-
-
Abubakar L. IBRAHEEM
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
John K. ALHASSAN
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Noel D. MOSES
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Suleiman AHMAD
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
- Keywords:
- Phishing, Cybercrime, Cyber Threats, Identity theft, Ensemble Learning.
- Abstract
-
Phishing is a criminal mechanism employing social engineering techniques to exploit human vulnerabilities and technical loopholes. This is to deceive users into divulging sensitive information, which are in turn used for fraudulent activities. Meanwhile, many machine learning approaches have been proposed in the literature, they often struggle with scalability, adaptability to emerging threats and the trade-off between detection accuracy and computational efficiency. This study aims to enhance phishing website detection through the implementation of an ensemble model that integrate Support Vector Machine (SVM) and Long Short-Term Memory (LSTM) networks. The methodology involves collecting a diverse dataset of phishing and legitimate URLs with a total of 343,525 records. This includes phishing URLs downloaded in CSV file format from PhishTank and Kaggle comprising a total of 167,582 records and legitimate URLs downloaded from the UC Irvine Machine Learning Repository and Kaggle consisting of 175,943 records. Static and Sequential features were extracted. 49 features were extracted and 15 were selected as the most relevant features using Recursive Feature Elimination (RFE) and univariate statistical tests. An ensemble architecture integrating SVM and LSTM networks was then trained using the selected features, employing stratified k-fold cross-validation. The results demonstrate that the proposed approach achieves high detection accuracy of 97.58%, precision 93.54%, recall 96.1% and F1- Score 95.78%, outperforming traditional models and various benchmark classifiers. The findings highlight the effectiveness of combining static and sequential features within an ensemble framework to improve the generalization and robustness of phishing detection systems. Exploring deep learning architectures like CNNs, LSTMs, and GANs in a hybrid framework will likely boost detection capabilities against evolving cyber threats.
- References
- Downloads
- Published
- 02-03-2026
- Section
- Articles
- License
-
Copyright (c) 2026 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Umar A. IBRAHIM, Abdulra’uf G. SHARIFAI, Hybrid CNN Feature Fusion with Optimization for Precision Potato Leaf Disease Classification , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Adekunle O. ADEWOLE, Ayodeji O. ARIYO, Development of an Edge-Enabled IoT Smart Energy Meter with Artificial Intelligence (AI)-Based Load Prediction for Device-Level Monitoring , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Zainab B. LAPAI, Joseph A. OJENIYI, Ismail IDRIS, Abdulkadir O. ABDULBAKI, Jennifer BALA, Entropy-Guided Neural Architecture for Family-Level Classification of Windows Ransomware , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Yusuf M. YAHAYA, Factors Contributing to the Erosion of Freehand Sketching Competence in Technology Education: A Case Study of Bayero University, Kano , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Abba M. BALA, Abdurrauf G. SHARIFAI, Umar S. HARUNA, A Hybrid Deep Learning Model for Efficient Anomaly Detection in Video Surveillance Systems , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Lawal B. IDRIS, A Review on Vehicular Ad Hoc Network (VANET) Security challenges and Solutions , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Lukman MOHAMMED, Victor O. WAZIRI, Ismaila IDRIS, Suleiman AHMAD, Performance Assessment of Android Antimalware Applications: An Experimental Approach , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
