Development of Ensemble SVM–LSTM Model for Phishing Website Detection
- Authors
-
-
Abubakar L. IBRAHEEM
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
John K. ALHASSAN
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Noel D. MOSES
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Suleiman AHMAD
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
- Keywords:
- Phishing, Cybercrime, Cyber Threats, Identity theft, Ensemble Learning.
- Abstract
-
Phishing is a criminal mechanism employing social engineering techniques to exploit human vulnerabilities and technical loopholes. This is to deceive users into divulging sensitive information, which are in turn used for fraudulent activities. Meanwhile, many machine learning approaches have been proposed in the literature, they often struggle with scalability, adaptability to emerging threats and the trade-off between detection accuracy and computational efficiency. This study aims to enhance phishing website detection through the implementation of an ensemble model that integrate Support Vector Machine (SVM) and Long Short-Term Memory (LSTM) networks. The methodology involves collecting a diverse dataset of phishing and legitimate URLs with a total of 343,525 records. This includes phishing URLs downloaded in CSV file format from PhishTank and Kaggle comprising a total of 167,582 records and legitimate URLs downloaded from the UC Irvine Machine Learning Repository and Kaggle consisting of 175,943 records. Static and Sequential features were extracted. 49 features were extracted and 15 were selected as the most relevant features using Recursive Feature Elimination (RFE) and univariate statistical tests. An ensemble architecture integrating SVM and LSTM networks was then trained using the selected features, employing stratified k-fold cross-validation. The results demonstrate that the proposed approach achieves high detection accuracy of 97.58%, precision 93.54%, recall 96.1% and F1- Score 95.78%, outperforming traditional models and various benchmark classifiers. The findings highlight the effectiveness of combining static and sequential features within an ensemble framework to improve the generalization and robustness of phishing detection systems. Exploring deep learning architectures like CNNs, LSTMs, and GANs in a hybrid framework will likely boost detection capabilities against evolving cyber threats.
- References
- Downloads
- Published
- 02-03-2026
- Section
- Articles
- License
-
Copyright (c) 2026 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Usman A. ABDURRAHMAN, Abubakar A. ROGO, Abdulkadir A. BICHI, Akibu M. ABDULLAHI, Beyond Overload: Assessing Cognitive Load to Facilitate Learning Transfer in Virtual Environments , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olusiji A. ADEYANJU, Joseph O. OLAIDE, Machine Learning Models for Predicting Flow Rate for Niger Delta Oil Wells , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Murtala ISMAIL, Mohammed S. ISMAIL, Eli A. JIYA, Machine Learning-Driven Recruitment Recommendation System for Employment in Nigerian Universities , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Shamsuddeen J. AHMAD, Saifullahi S. SADI, Muhammad M. AHMAD, Abdullahi D. UMAR, Shamsuddeen USMAN, Comparative Analysis of Machine Learning Algorithms for the Detection and Classification of Suspicious Emails , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Mokọ́ládé JOHNSON, Bashir SALIM, Enobong EQUERE, Miriam I. CHUKWUMA-UCHEGBU, Emma EKPO, Ali B. ABDULSALAM, Conserving Indigenous Geometries: A Vital Approach to Integrating Cultural Heritage into Architectural Education , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Opeyemi O. ASAOLU, Oluwasanmi S. ADANIGBO, Temidayo J. AKINDAHUNSI, Advances in Privacy Preservation Techniques for Mobile Ad Hoc Networks: A Review , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Usman A. ABDURRAHMAN, Abdulkadir A. BICHI, Usman HARUNA, Akibu M. ABDULLAHI, A Hybrid Graph Neural Network Framework Integrating Handcrafted Features for Real-Time Iris Recognition in Motion , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Lukman MOHAMMED, Victor O. WAZIRI, Ismaila IDRIS, Suleiman AHMAD, Performance Assessment of Android Antimalware Applications: An Experimental Approach , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
