Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

An Empirical Evaluation of the Main Factors of a Cybersecurity Culture in South African E-health Institutions Using Multiple Linear Regression

Nwanneka E. Mwim , Jabu Mtsweni , Bester Chimbo

E-health institutions are prominent targets for cybercriminals due to their reliance on information technology systems and issues related to the users have been identified as the biggest security weakest. Hence, while cybersecurity culture (CSC) research emphasizes the necessity of the human factor, limited empirical work has been done in the context of e-health in Africa. Therefore, an empirical evaluation was conducted to identify how preparedness, responsibility, management, technology and environment influence cybersecurity in South African e-health institutions. This quantitative research studied e-health institutions in the Mpumalanga province of South Africa. Various methods were used to investigate the multiple linear regression effects of the main factors of CSC and the results show that although the preparedness (Beta = 0.281; p-value < 0.05) and environment (Beta = 0.500; p-value < 0.05) factors had the greatest influence, management, technology and environment had a positive effect on CSC. These factors contributed 48.2 % to the variance (R-Squared). The study seems to be the first empirical study that combines the human factor domain framework (HFD) with other theoretical frameworks to identify critical factors of CSC. Furthermore, the impact of technology on CSC was empirically tested. The study is significant as it identified key factors that contributed to the institution’s CSC and quantified their impact. These results can enable e-health institutions to make decisions based on evidence regarding their cybersecurity interventions, strategy and practices. However, the empirical evaluation was limited to one context, namely the Mpumalanga province in South Africa and at two hospitals selected based on easy access (convenience) and purposive sampling with criteria based on work experience and knowledge of CSC limited the number of participants eligible to participate.

Read More

Doi: https://doi.org/10.54216/JCIM.170213

Vol. 17 Issue. 2 PP. 178-199, (2026)

A Hybrid Intelligent Facial Recognition Model Based on Hierarchical Feature Extraction and Il-lamination Normalization

Ali F. Rashid , Ilyas Khudhair Yalwi , Ali Hakem Alsaeedi , Riyadh Rahef Nuiaa Alogaili , Mazin Abed Mohammed

Face recognition in unconstrained environments is difficult due to varying poses and lighting conditions. This can severely impair the performance of intelligent recognition models. Traditional methods often do not adapt well to these variations, which results in poor performance and limited applicability. This paper proposes a hybrid intelligent face recognition model based on hierarchical feature extraction and illumination normalization (H-FR). The proposed method employs a hierarchical feature extraction model to capture macro and micro facial details, ensuring reliable recognition across diverse poses and lighting conditions. Employing Adaptive Histogram Equalization on the A and B channels of the LAB colour space effectively normalizes illumination variations, enhancing the visibility and consistency of facial features. The proposed model has been tested and validated on the "Pins Face Recognition" dataset available on Kaggle, which encompasses various celebrity faces captured in varying poses and lighting conditions. The proposed model has been demonstrated through extensive experimentation to outperform AlexNet and VGG-19. The compared algorithms achieved accuracies of 88% for AlexNet and 93% for VGG-19, while the proposed H-FR model achieved 96%.

Read More

Doi: https://doi.org/10.54216/JCIM.170201

Vol. 17 Issue. 2 PP. 01-13, (2026)

MACSteg: Real-Time Voice Authentication and Deepfake Protection Using Device MAC Address Steganography

Sanaa Ahmed Kadhim , Zaid Ali Alsarray , Saad Abdual Azize Abdual Rahman , Massila Kamalrudin , Mustafa Musa

The invention of deepfake applications make it possible to produce highly natural and real voice recordings which creates critical concerns about the credibility of audio telecommunications. The confirmation of the speakers’ voices became essential especially for sensitive data such as financial, healthcare, and surveillance risk management services, authentication of speakers’ voices became significantly crucial. To improve solutions to this issue, this paper presents MACSteg strategy which is a real-time, lightweight voice authentication technique by discreetly encapsulate device’s MAC address within voice file using Quantization Index Modulation (QIM) stego-technique. Unlike many traditional strategies that degrade voice quality or produces noticed jitter, MACSteg technique preserve both clarity and efficiency. Implementations showed that the hidden MAC address stayed intact in spite of some typical voice processing such as compression, while interfered signals reformed by clatter or volume variations were consistently detected. The proposed system obtained a high signal-to-noise ratio (SNR) exceeding 70 dB, illustrating that the alterations were inaudible, and maintained well in real-time submissions, giving only a processing delay of 0.01 milliseconds per each audio segment. The results indicate MACSteg’s potential as a ascendable and effective approach for safeguarding voice authenticity, especially in circumstances where verification of speaker’s voice is vital.

Read More

Doi: https://doi.org/10.54216/JCIM.170202

Vol. 17 Issue. 2 PP. 14-22, (2026)

Integration of Crayfish Optimization with Watermarking Scheme for Automated Tampering Text Detection

Hanan T. Halawani

Digital text document serves as the essence of existing communication but still pose major safety concerns on their vulnerability to tampering. Digital text watermarking acts as a powerful tool to secure the reliability of textual data. Presenting a hidden layer of safety and accountability enables organizations and individuals to make sure of the truth behind each file and trust the written word. Watermarking detects tampering by checking the embedded signature for changes or distortions. The Watermark model is capable of mechanically repairing and classifying themselves once tampered with, enhancing document resilience. Watermarking is an effective mechanism to identify tampering attacks in digital documents. The specialized process of embedding imperceptible and strong watermarks in document creation or distribution detects alterations. This study proposes the Crayfish Optimization with a Watermarking Scheme for Automated Tampering Text Detection (CFOWS-ATTD) technique. The major purpose of the CFOWS-ATTD technique is to accomplish the security of English text using content authentication and tampering detection. In the CFOWS-ATTD technique, two-stage processes are involved. Moreover, the CFOWS-ATTD technique generates a watermark from the text document and performs extraction to verify text authenticity. Furthermore, the CFO approach optimally places the watermark to ensure it remains robust and imperceptible to tampering. The experimentation of the CFOWS-ATTD approach is performed under the ELST, ESST, EHMST, and EMST datasets. The results implied that the CFOWS-ATTD approach obtains optimum performance over other techniques.

Read More

Doi: https://doi.org/10.54216/JCIM.170203

Vol. 17 Issue. 2 PP. 23-33, (2026)

Enhancing Cybersecurity through Ransomware Detection using Hybridization of Heuristic Feature Selection with Deep Representation Learning Model

Maha Farouk Sabir

Network security has become vulnerable to hacker threats owing to its advancement and easily accessible to computer and internet technology. Ransomware is the most commonly used malware in cyberattacks to mislead the victim user to expose private and sensitive data to hackers. Ransomware is malicious software that encodes the entire system or consumer’s files, creating it impossible, and later demands a payment fee from the victim’s computer in exchange for the decryption key. Ransomware attacks become highly popular and overwhelming for both individuals and organizations. Recently, deep learning (DL) and machine learning (ML) models are established to identify ransomware attacks in real-time and categorize them into various types. The system will be considered to examine the behaviors of malicious software and detect the particular kind of ransomware being utilized. This data will enhance the system’s accuracy and deliver appropriate data to cybersecurity professionals and victims. Therefore, this study proposes an accurate Ransomware Detection and classification using the Hybrid Metaheuristic Feature Selection with Deep Learning (RDC-HMFSDL) technique. The aim is in effectually detecting and classifying the ransomware attacks. Initially, the RDC-HMFSDL technique utilizes min-max model to transform the input data into a standard setting. Furthermore, the hybrid red deer sparrow search optimization (HRDSO) approach is used for the feature selection (FS). For ransomware attack detection, the long short-term memory autoencoder (LSTM-AE) approach is employed. Finally, the sine cosine algorithm (SCA) is used to optimally choose the parameter values of the LSTM-AE approach. The RDC-HMFSDL approach was tested on a benchmark dataset, achieving a superior accuracy of 99.88% compared to existing methods.

Read More

Doi: https://doi.org/10.54216/JCIM.170204

Vol. 17 Issue. 2 PP. 34-47, (2026)

Feature Subset Search for Cybersecurity in Industrial Internet of Things Environment Using Coot Optimization Algorithm

Adil. O. Y. Mohamed , Yousef Asiri , Manahill I. A. Anja , Bandar M. Alghamdi , Abdelgalal O. I. Abaker , Mnahil M. Bashier

The Industrial Internet of Things (IIoT) is the incorporation of industrial processes with smart technology and interconnected devices to improve productivity and efficiency. The need for robust cybersecurity measures is crucial as the IIoT environment becomes vital to critical infrastructure in industries. Cybersecurity in IIoT is paramount to secure against possible threats, which ensures the integrity and resilience of industrial operations. Intrusion detection systems (IDSs) are instrumental in detecting anomalies, unauthorized access, or malicious activities. The incorporation of deep learning (DL) further reinforces the cybersecurity posture of the IIoT network. DL approach excels in analyzing complex and large datasets, which enables the detection of complex cyber threats by learning anomalies and patterns. Industrial processes can operate with heightened security, securing sensitive information, and critical infrastructure, and maintaining the reliability of a connected system in the industrial landscape by combining IIoT cybersecurity with innovative intrusion detection and DL technologies. Therefore, this article proposes an Integration of Coot Optimization Algorithm-based Feature Subset Search with Deep Learning for Cybersecurity (COAFSS-DLCS) technique on IIoT network. The objective is in the effectual recognition and classification of cyberattacks in the IIoT environment. Initially, the COAFSS-DLCS method uses min-max scalar to transform the input dataset into a suitable format. Furthermore, the COAFSS-DLCS employs the COAFSS approach for choosing an optimal feature subset. Additionally, the stacked long short-term memory autoencoder (SLSTM-AE) model is employed for classification. Moreover, the parameters of the SLSTM-AE classifier are fine-tuned using the Arithmetic Optimization Algorithm (AOA) for improved performance. A comprehensive empirical validation of the COAFSS-DLCS approach is performed under the UNSW_NB15 and UCI_SECOM datasets. The simulation outputs inferred the power of the COAFSS-DLCS over other methods.

Read More

Doi: https://doi.org/10.54216/JCIM.170205

Vol. 17 Issue. 2 PP. 48-63, (2026)

Nature-Inspired Learning Framework for Cyberattack Classification in IoT Networks

Ishwarya K. , Saraswathı S.

Due to the massive data and communication progress, the usage of Internet of Things (IoT) devices has developed significantly. The extensive use of IoT systems heightens the complex interactions among devices and increases the data traffic, generating numerous possibilities for cyber challengers. Therefore, identifying and alleviating cyber-attacks focusing on IoT systems has appeared as an essential obligation in the context of cybersecurity. Academics and enterprises are contemplating means of machine learning (ML) and deep learning (DL) for cyberattack prevention because ML and DL exhibit great potential in numerous domains. Various DL teachings are executed to extract several patterns from multiple annotated datasets. DL is a beneficial tool for identifying cyberattacks. Timely network data detection and segregation become more fundamental than alleviating cyberattacks. Therefore, this paper proposes a novel Brown Bear Optimization method with an Ensemble of Machine Learning-based Cyber Attack Detections (BBOA-EMLCADs) method for secure IoT environment. The main aim of the BBOA-EMLCAD method relies on the automatic classification of the cyber threats in the IoT environment. Initially, the brown bear optimization (BBO) method is utilized for feature selection (FS). Moreover, an ensemble of two ML approaches namely XGBoost and least square support vector machine (LSSVM) are employed for the automatic identification of the cyber-attacks. Lastly, the salp swarm algorithms (SSAs) is implemented for the optimal hyperparameter tuning of the two ML techniques. The simulation validation of the BBOA-EMLCAD approach is performed under the WSN-DS dataset. The comparison assessment of the BBOA-EMLCAD approach portrayed a superior accuracy value of 99.62% over existing models.

Read More

Doi: https://doi.org/10.54216/JCIM.170206

Vol. 17 Issue. 2 PP. 64-81, (2026)

Optimizing VANET Clustering Algorithms for 3D Urban Environments: Impact of Traffic Congestion and Driver Behavior on Network Performance

Ahmed Salih Al-Obaidi , Ghaith J. Mohammed , Waleed Khalid Alzubaidi

Vehicular Ad-hoc Networks (VANETs) play a crucial role in intelligent transportation systems, facilitating communication between vehicles and infrastructure in urban environments. Clustering algorithms are essential for managing network topology and enhancing communication efficiency in VANETs. The complex nature of three-dimensional (3D) urban environments, coupled with varying traffic conditions and driver behaviors, presents significant challenges for VANET clustering algorithms. Understanding these interactions is vital for developing robust and efficient VANETs. This study investigates how vehicle generation patterns, driving dynamics, and 3D road geometries influence the performance of VANET clustering algorithms in urban settings, focusing on network connectivity and stability. A comprehensive simulation framework was developed, incorporating a Traffic Generator model, a Mobility Model, and a Model of Road Curvature. The methodology evaluated clustering algorithm performance across three traffic congestion levels (low, medium, high) and three driver aggression levels for each congestion scenario. Data analysis, correlation studies, and sensitivity analysis were conducted to assess the impact of these factors on clustering efficiency. The study revealed significant correlations between traffic congestion levels, driver aggression, and clustering performance. Higher congestion levels led to more frequent cluster reconfigurations, while increased driver aggression affected the predictability of vehicle movements, affecting cluster stability. The 3D nature of urban environments introduced additional challenges, particularly in areas with elevation changes. The findings underscore the need for adaptive clustering algorithms capable of responding to dynamic urban traffic conditions. The research provides valuable insights for optimizing VANET clustering strategies in 3D urban environments, contributing to the development of more efficient and reliable vehicular communication networks for future smart cities.

Read More

Doi: https://doi.org/10.54216/JCIM.170207

Vol. 17 Issue. 2 PP. 82-96, (2026)

Feature Selection Techniques in Intrusion Detection Systems: A Review

Ahmad Salim , Obaid Salim , Omar Muthanna Khudhur , Shokhan M. Al-Barzinji , Farah Maath Jasem

Intrusion detection has garnered significant attention as researchers strive to develop sophisticated models characterized by their high accuracy levels. However, the persistent challenge lies in creating reliable and effective intrusion detection systems capable of managing vast datasets under dynamic, real-time conditions. The effectiveness of such systems largely depends on the chosen detection methodologies, specifically the feature selection processes and the application of machine learning techniques. This paper offers a comprehensive review of feature selection methods employed in the realm of intrusion detection research. It examines various dimensionality reduction strategies, followed by a systematic classification of feature selection techniques to assess their impact on the training phase and subsequent detection efficacy. The focus was on the wrapper, filter feature selection methods, where the methods used were analysed, and their strengths and weaknesses were revealed. The identification and selection of the most pertinent features have been shown to significantly enhance the detection performance, not only in terms of accuracy but also in reducing computational demands, underscoring its critical importance in the architecture of intrusion detection systems.

Read More

Doi: https://doi.org/10.54216/JCIM.170208

Vol. 17 Issue. 2 PP. 97-112, (2026)

Advancing Cybersecurity in IoT: A Data-Driven Approach to Discovering Unknown Botnet Attacks

Innocent Mbona , Jan H. P. Eloff

Over the years, exciting new technologies such as the Internet of Things (IoT) have changed many aspects of our lives, including smart homes. Unfortunately, this technology is vulnerable to cyber attacks owing to the lack of physical boundaries to ensure safety, privacy, and security. Botnet attacks are among the prominent cybersecurity threats because they can compromise the entire network with cyber attacks, such as distributed denial-of-service (DDoS) attacks. Hence, the intelligent discovery of new unknown botnet attacks remains a challenge, particularly in IoT environments, owing to the complex nature of the signatures of unknown botnet attacks. Through a systematic literature review, we provide a comprehensive review of current studies to determine the trends and challenges in the discovery of unknown botnet attacks. This study implemented a lightweight intelligent data-driven methodology called CySecML to discover unknown botnet attacks. The CySecML methodology differs from existing methods because of its unique data preparation and feature selection methods, specifically aimed at mitigating cyber attacks. The effectiveness of this methodology is demonstrated using state-of-the-art botnet attack data sets, where the self-training machine-learning algorithm achieved the best results with an F1-score of 94%.

Read More

Doi: https://doi.org/10.54216/JCIM.170209

Vol. 17 Issue. 2 PP. 113-134, (2026)

Impact of XSS Attacks on Cybersecurity and Detection Approaches Using Machine Learning Techniques: A Survey

Ali Nafea Yousif , Ziyad Tariq Mustafa Al-Ta'i

The dramatically increasing use of web applications and the rapid development of cloud services and interactive websites that provide integrated online services, relying on user data entry and server response, have been the primary drivers of the increase in cyber-attacks and threats, most notably cross-site scripting (XSS). Cross-site scripting attacks exploit available security vulnerabilities to inject malicious code, leading to numerous risks such as malware distribution, session hijacking, and data theft. Most traditional defense methods, such as input validation and output encoding, are reasonably ineffective against advanced threats. The advances in machine learning and artificial intelligence models have provided more accurate detection and prevention capabilities for these threats with significant accuracy. This study reviews the types and mechanisms of XSS attacks, existing mitigation techniques, and detection methods based on machine and deep learning. It also highlights several previous studies and related work on detecting and preventing these attacks, compares these works' performance using evaluation metrics and several aspects, identifies research gaps, and outlines future directions for improving XSS detection methods.

Read More

Doi: https://doi.org/10.54216/JCIM.170210

Vol. 17 Issue. 2 PP. 135-145, (2026)

Vector Search in Large Language Models: Experimental Evaluation with MongoDB Atlas

Deepak , Savita Sheoran

The growth of Large Language Models (LLMs) applications has intensified the demand for efficient vector database solutions capable of handling high-dimensional semantic search operations. Contemporary information retrieval systems face significant challenges in processing complex queries across vast knowledge repositories while maintaining contextual accuracy and computational efficiency. This research investigates the optimization potential of vector search implementations in LLMs through comprehensive evaluation using MongoDB Atlas as the primary vector database platform. Traditional keyword-based retrieval methods fail to capture semantic relationships and contextual nuances essential for accurate information extraction in modern AI applications. Vector-based query optimization enables semantic similarity matching, allowing systems to access contextually relevant data or information even when exact keyword matches are absent. But it significantly improving response quality and user experience. The study addresses critical performance bottlenecks in production-scale vector search deployments, where query latency and retrieval accuracy directly impact system usability. Through systematic comparison of traditional text-embedding-ada-002 against the advanced text-embedding-3-small model, we demonstrate substantial performance enhancements across multiple evaluation metrics. Results establish text-embedding-3-small as superior for semantic search applications, while GPT-4o-mini demonstrates optimal faithfulness performance (0.9067) for accuracy-critical deployments.

Read More

Doi: https://doi.org/10.54216/JCIM.170211

Vol. 17 Issue. 2 PP. 146-166, (2026)

Digital Forensic Investigation of an iOS Mobile Phone Using iTunes and iCloud Backup

Robinson Tombari Sibe , Adewale Alayegun

The growing popularity of iOS devices and the increasing complexities of forensic investigation of these devices requires more research attention. Due to the complex encryption and closed nature of iPhones, it is inherently complicated to perform digital forensic investigations. While there are many extraction and analysis methods for iphone, the most comprehensive (but most complex) is the full physical acquisition. However, the likelihood of acquiring physical extraction of an iPhone is becoming more challenging as Apple improves on its mobile technology, with more emphasis on privacy and security. Factors such as the adoption of full file and disk encryption, and secure enclave technology poses serious challenge to forensic investigators. This paper explored alternatives, by extracting and analyzing valuable evidential artifacts using iTunes and iCloud, unique to the iOS environment. This research involved the forensic examination of an iPhone XR running on iOS 17.5, using Oxygen Forensic Device Extractor v2.13.1, with each step documented. The study uncovered several artifact locations and provided a brief description of each, and their usefulness in a forensics analysis. Some of these include user-generated content, system artifacts, application data, and cloud interactions, such as contacts, SMS data, call history, media files, database, browser data, application data and others, that could prove vital in solving a case. This study made valuable contribution to the body of knowledge by highlighting specific challenges faced in iOS forensics and recommending a methodical approach to examining and analyzing evidential artifacts using iTunes and iCloud. The paper also addressed the gap in available literature in iOS forensics.

Read More

Doi: https://doi.org/10.54216/JCIM.170212

Vol. 17 Issue. 2 PP. 167-177, (2026)

Empirical Analysis of Computationally Intelligent Technique for Software Risk Prediction

Mohd Shabbir , Rakesh Kumar Yadav , Mohd Waris Khan , Hitendra Singh

Software development is inherently associated with a high degree of uncertainty, often arising from unforeseen activities during different phases of the SDLC. As software systems expand in scale and complexity, the likelihood of failures and project delays also increases. Such situations, which are usually not anticipated, are known as software risks. They arise due to different reasons, which affect activities like essentials of engineering, making, putting into usage, and test. These risks need to be identified and managed in the initial phase for delivering software-related products that are both excellent and can be relied upon. While it has been standard practice in assessing software risks to depend upon human skills and previous experiences, it has been observed they lead to issues in consistency and often are reported to be unreliable. The current study is an attempt to tackle this issue through usage of predictive models that have their roots in machine learning (ML).  Borrowing from existing data, software risks are identified and classified through five popular machine-learning tools. To improve correctness and make it more robust, selection techniques of selection with multiple features are implemented. Among the other models, the Support Vector Machine (SVM) exhibited the maximum performance, achieving a classification accuracy of approximately 80%, with a precision of 84%, recall of 80%, and an F1 score of 80%. In terms of performance, Mutual Information was found to be best in methods of applied feature selection. The study indicates the ability of ML based methods in predicting and managing software risks. Additionally, this research highlights the potential of computationally intelligent techniques to assist project managers in early risk identification, proactive decision-making and enhancing the overall success rate of s/w projects.

Read More

Doi: https://doi.org/10.54216/JCIM.170214

Vol. 17 Issue. 2 PP. 200-209, (2026)

A Reinforcement Learning Framework for Adaptive Detection of Phishing Attack

Sharvari Patil , Narendra M. Shekokar , Aditya Surve , Priyanka Ramchandran

Phishing is one of the most dominant forms of cybercrime, with over half a billion incidents occurring annually. It remains one of the most insidious forms of fraud due to its effectiveness. Phishing attacks are on the rise with increasingly deceptive tactics, often leading unwitting victims to divulge personal information. Phishing frauds also involve website phishing, which mimics legitimate sites. Despite the best user training and practices, people still fall for these frauds. The methodology of detecting phishing attacks using the blacklisting approach was not very effective since these URLs are active for a limited period. Hence, Machine Learning methods were used for detecting the phishing attempt. Machine learning solutions are not adaptive to changes in the approach and are biased towards the developed solution. In addition, there is a need to develop a solution to this constantly evolving phishing attack. The proposed system is an attempt to use reinforcement-learning methodology as the solution to detect phishing. It has trained an adaptive intelligent learning system based on previous experiences using the Q-learning algorithm. The system focuses on dynamically selecting the relevant features and the classification model. The agent is trained to select optimal features and classification models dynamically based on Q-learning algorithm. In contrast to static methods, the proposed system continuously adapts its strategy of combinations feature subsets and classification models as defense against the rapidly evolving attacks. The system aims to supplement existing cybersecurity measures with an adaptable tool capable of countering sophisticated phishing schemes. The experimental analysis shows that the proposed methodology attained an accuracy of 99.25%, demonstrating its high performance in phishing detection.

Read More

Doi: https://doi.org/10.54216/JCIM.170215

Vol. 17 Issue. 2 PP. 210-226, (2026)

Enhancing Phishing URL Detection Accuracy in Software-Defined Networks (SDNs) through Feature Selection and Machine Learning Techniques

A. Usha Ruby , George Chellin Chandran J.

Phishing attacks remain a persistent and ever-evolving threat to both networked systems and their users' privacy. In response to this formidable challenge, our research delves into an innovative approach designed to enhance the precision of phishing Uniform Resource Locator (URL) detection within the dynamic and programmable realm of Software-Defined Networks (SDNs). By harnessing feature selection capabilities and adaptive machine learning techniques, our proposed framework aims to fortify security measures in SDNs against these malicious campaigns. Our methodology's core is the deliberate selection of discriminative features from the extensive network data attributes. This feature selection process is meticulously designed to identify the most relevant characteristics associated with phishing URLs, thereby enabling the extraction of invaluable insights for more precise detection. These carefully chosen features then serve as inputs for a dynamic machine-learning model, trained to adapt and evolve alongside the constantly changing landscape of phishing attacks. Within the SDN environment, our framework optimizes utilizing network resources and controller processing power. It achieves this by reducing the dimensionality of input data, resulting in improved detection accuracy and a decrease in false positives. The adaptive nature of our machine-learning model ensures rapid recognition of emerging phishing tactics, thereby reducing the risk of succumbing to novel and sophisticated attacks. To validate the effectiveness of our approach, we conducted extensive experiments and evaluations within an SDN testbed, utilizing real-world phishing URL datasets. The results consistently demonstrate that our framework surpasses conventional methods, achieving higher detection accuracy and adaptability to evolving threats. In summary, our research represents a significant stride in the ongoing battle against phishing attacks by leveraging the dynamic capabilities of SDNs. The synergy between feature selection and adaptive machine learning techniques empowers SDNs to sustain accurate and effective phishing URL detection, ultimately reinforcing network security and safeguarding user privacy in an ever-evolving threat landscape.

Read More

Doi: https://doi.org/10.54216/JCIM.170216

Vol. 17 Issue. 2 PP. 227-226, (2026)