Research Article

Hybrid Rule-Based Solution for Phishing URL Detection Using Convolutional Neural Network

Table 3

Comparison of advantages and disadvantages of different phishing detection techniques.

MethodsAdvantagesDisadvantages

BlacklistDoes not require high resources to use it
Fast
Excellent when minimal FP (false positive) required
Not trusted
Not always updated
Lexical and hostProvides a sort of lexical profile for such URL
Can prevent and not only detect
Should always be updated
Needs human intervention sometimes
ContentTrusted
Detect hidden content like iframes
Cannot detect obfuscation
Should be maintained
IdentityOffers an owner profileNot trusted
Visual similarityEffective
Mitigate zero-hour attack
Higher FP rate
High computational cost
BehavioralDetects hidden anomalies
Reveals novel abnormal behaviors
Very high computational cost
Needs human intervention
Should be maintained
Machine learningCan prevent and not only detect
Mitigate zero-day attack
Construct its own models
Time-consuming
Needs maintenance
Works through several rules
Deep learningCan prevent and not only detect
Mitigate zero-day attack
Constructs its own models
Becomes more effective with data increase
Time-consuming
Should be maintained
A vast number of rules
Massive number of parameters to handle