Phishing is a significant cybersecurity threat in which attackers exploit manipulated URLs to deceive users and obtain confidential information. As phishing attacks continue to grow in complexity, automated machine learning based detection methods have become essential to strengthen digital security. This study proposes a URL based phishing detection model using boosting algorithms while analyzing the role of feature selection in improving classification performance and computational efficiency. The experiments were conducted on a dataset consisting of 10000 instances with 50 features and balanced class labels. After data preparation, 48 features were retained as input variables, and min max normalization was applied to ensure uniform feature scaling. Three boosting algorithms namely Gradient Boosting, XGBoost, and AdaBoost were evaluated using accuracy, precision, recall, and F1 score. Among these methods, XGBoost achieved the highest accuracy of 98.8 percent, demonstrating its effectiveness in learning complex URL patterns. Subsequently, three feature selection techniques namely Information Gain, Chi Square, and ReliefF were applied and evaluated using 10 fold cross validation. The results indicate that ReliefF provides the most effective feature reduction by selecting 37 features while maintaining the same classification accuracy. Unlike previous studies that mainly focus on classifier comparison, this study demonstrates that integrating XGBoost with ReliefF enables significant feature dimensionality reduction without compromising predictive accuracy. This finding highlights an efficient trade off between detection performance and computational complexity. Overall, the proposed framework offers a robust, efficient, and scalable solution for fast and adaptive phishing detection in modern cybersecurity environments.
Copyrights © 2026