ARCHIVES

Original Article

Phishing Detection Using Behavioral Cues in Browser Interaction

Shanmathi K1Dr. S. Latha2

¹ MSc student, cyber forensic and Information Security, Dr MGR Educational and Research Institute, Chennai, Tamil Nadu, India. ² Director i/c, center for cyber forensics and information security, University of madras, Chennai, Tamil Nadu, India.

Published Online: May-August 2026

Pages: 247-252

Abstract

In this modern society where technologies are gradually increasing, Internet and browsing acts as a very crucial form of information delivery. Threat Attackers use this to their advantage to lure users into harmful websites that steals user’s personal information and that leads to most of the cybercrimes. Phishing acts as prevalent cyberattack which results in loss of sensitive information and financial losses. Old detection techniques involve mostly static indications like URL analysis and blacklist matching, but nowadays attackers are brilliantly tackling these detections by constantly evolving their phishing patterns and their schemes. Even though people are more aware so are these attackers in creating such fake sites exactly like an influential website and other mainstream sites. This confuses the people and leads to attackers gaining the data of users to use it in cybercrimes like identity theft. Most of the users get scammed by the interface of the website, because it seems more like a genuine website with proper logo and the login panel and also with no glitch in the website. Even if people hesitate to enter their details when they are unsure of the legitimacy of a site and try to verify using basic techniques, they can only detect sites that are already in their databases so sophisticated and zero-day exploits can easily these types of detection. In this paper, a prototype of the behavioural cue-based detection system is developed in order to handle such issues. This system examines the interactive behaviour of the user while they are accessing both regular web pages and login pages to detect the possibility of a phishing attempt by taking multiple data metrics such as mouse movements, click movements, click patterns, scrolling activity, keystrokes and time spent to reach to a conclusion. These data metrics are processed and classified using a Random forest machine learning model to categorize them as legitimate or phishing. A real time web based protype with a frontend-backend structure is used to make a web interface to demonstrate the use of this detection system.

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

2026

A Novel Stateful Orchestration Pattern for Data Affinity and Transactional Integrity in Sharded Backend Architectures

2026

Legal Challenges of Agentic AI Systems in Education and Employment Decision-Making

2026

New-Hybrid Soft Computing Model for Stock Market Predictions

2026

Human Emotion Distribution Learning from Face Images Using CNN

2026

Enhancements and Optimization of the Canny Edge Detection Algorithm

Phishing Detection Using Behavioral Cues in Browser Interaction | INDJCST | INDJCST