Home > Published Issues > 2025 > Volume 16, No. 11, 2025 >
JAIT 2025 Vol.16(11): 1529-1539
doi: 10.12720/jait.16.11.1529-1539

Smart Firewall for Phishing Detection Powered by Bio-Inspired Algorithms

Mosleh M. Abualhaj 1,*, Sumaya N. Al-Khatib 2, Ahmad A. Abu-Shareha 3, Abdallah Hyassat 3,
and Mohammad Sh. Daoud 4
1. Department of Networks and Cybersecurity, Faculty of Information Technology, Al-Ahliyya Amman University, Amman, Jordan
2. Department of Computer Science, Faculty of Information Technology, Al-Ahliyya Amman University, Amman, Jordan
3. Department of Data Science and Artificial Intelligence, Faculty of Information Technology, Al-Ahliyya Amman University, Amman, Jordan
4. College of Engineering, Al Ain University, Abu Dhabi, United Arab Emirates
Email: m.abualhaj@ammanu.edu.jo (M.M.A.); sumayakh@ammanu.edu.jo (S.N.A.); a.abushareha@mmanu.edu.jo (A.A.A.); a.hyassat@ammanu.edu.jo (A.H.);
mohammad.daoud@aau.ac.ae (M.S.D)
*Corresponding author

Manuscript received July 31, 2025; revised August 12, 2025; accepted August 21, 2025; published November 7, 2025.

Abstract—Phishing attacks continue to pose significant risks to digital security by exploiting user vulnerabilities through deceptive methods. This paper presents a smart firewall model for phishing detection that leverages bio-inspired algorithms to enhance threat identification and response. The model utilizes the Whale Optimization Algorithm (WOA) and Dragonfly Algorithm (DA) independently for effective feature selection, thereby reducing data dimensionality while retaining critical phishing indicators. These optimized features are then processed by advanced Machine Learning (ML) classifiers—Extra Trees (ET), Random Forest (RF), and K-Nearest Neighbors (KNN)—to rigorously evaluate detection accuracy. Experimental results on the ISCX-URL2016 dataset demonstrate that the combination of WOA with the ETs classifier achieves a superior detection accuracy of 98.86%, precision of 99.50%, recall of 99.50%, F1-Score of 99.50%, outperforming alternative configurations and recent methods. This result highlights the potential of bio-inspired optimization combined with ML to develop intelligent, adaptive firewalls capable of effectively mitigating phishing threats.
 
Keywords—smart firewall, phishing detection, bio-inspired algorithms, feature selection, machine learning

Cite: Mosleh M. Abualhaj, Sumaya N. Al-Khatib, Ahmad A. Abu-Shareha, Abdallah Hyassat, and Mohammad Sh. Daoud, "Smart Firewall for Phishing Detection Powered by Bio-Inspired Algorithms," Journal of Advances in Information Technology, Vol. 16, No. 11, pp. 1529-1539, 2025. doi: 10.12720/jait.16.11.1529-1539

Copyright © 2025 by the authors. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Article Metrics in Dimensions