Phishing Attack Detecting System Using DNS and IP Filtering


  • Md. Sohidul Islam Department of Computer Science, American International University-Bangladesh, Bangladesh
  • Md. Sajjad Department of Computer Science, American International University-Bangladesh, Bangladesh
  • Mohammad Mahmudul Hasan Department of Computer Science, American International University-Bangladesh, Bangladesh
  • Mohammad Sakib Islam Mazumder Department of Computer Science, American International University-Bangladesh, Bangladesh



HTTPS, IP, DNS, Phishing, Cyber Security


This study examines the different types of phishing attacks, which are a major threat to digital security. Phishing involves the use of fraudulent messages to deceive recipients, including email spoofing, spear phishing, phone phishing, clone phishing, pharming, HTTP phishing, man-in-the-middle attacks, and fast-flux phishing. Attackers can gather information about their targets from public sources such as social media networks, including work history, interests, and activities. The study developed a filtered website that detects fraudulent links based on the internet protocol (IP), register date, and domain name server (DNS) of each website. While further research is needed to improve the effectiveness of the site, this marks an important step towards enhancing digital security.


P. Gillin, The history of phishing [Online]. Available: Accessed on 19 February 2023.

By Gatefy, Updated at March 19, 2021 [Online]. Available:,22%25%20of%20 cases%20of%20breaches.&text=In%20cases%20of%20breaches%20involving,Personal%20data.

N. Agrawal and S. Singh, “Origin (dynamic blacklisting) based spammer detection and spam mail filtering approach,” 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), Moscow, pp. 99-104, 2016.

J. V. Chandra, N. Challa and S. K. Pasupuleti, “A Practical Approach to E-mail Spam Filters to Protect Data from Advanced Persistent Threat,” 2016 International Conference on Circuit, Power and Computing Technologies (1CCPCT), Nagercoil, pp. 1-5, 2016.

A. K. Sharma and R. Yadav, “Spam Mails Filtering Using Different Classifiers with Feature Selection and Reduction Technique,” 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, pp. 1089-1093, 2015.

J. Thomas, N. S. Raj and P. Vinod, “Towards filtering spam mails using dimensionality reduction methods,” 2014 5th International Conference- Confluence the Next Generation Information Technology Summit (Confluence), Noida, pp. 163-168, 2014.

H. AIRashid, R. AIZahrani and E. EIQawasmeh, “Reverse of e-mail spam filtering algorithms to maintain e-mail deliverability,” 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), Bangkok, pp. 297-300 2014.

G. R. Kumar, S. Gunasekaran and V. A S, (2018). URL Phishing Data Analysis and Detecting Phishing Attacks using Machine Learning in NLP, International Journal of Engineering Applied Sciences and Technology (IJEAST), 70-75.

B. Miller, Proposals for Holistic Security in Preventing Email Phishing Attacks.

A. Ferreira and P. M. V. Marques, “Phishing Through Time: A Ten-Year Story based on Abstracts,” In ICISSP, pp. 225-232, January 2018.

S. Nasiri, M. T. Sharabian and M. Aajami, “Using combined one-time password for prevention of phishing attacks,” Engineering, Technology & Applied Science Research, Vol. 7, No. 6, pp. 2328-2333, 2017.

V. Bhavsar, A. Kadlak and S. Sharma, “Study on phishing attacks,” Int. J. Comput. Appl., Vol. 182, pp. 27-29, 2018.

O. K. Sahingoz, S. I. Baykal and D. Bulut, “Phishing detection from urls by using neural networks,” Computer Science & Information Technology (CS & IT), pp. 41-54, 2018.

A. Alsayed and A. Bilgrami, “E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activities,” Int. J. Of Emerg. Techn. and Adv. Activ, Vol. 7, No. 1, pp. 109-115, 2017.

G. J. W. Kathrine, P. M. Praise, A. A. Rose and E. C. Kalaivani, “Variants of phishing attacks and their detection techniques,” In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, pp. 255-259, April 2019.

C. Parulekar, “Minimize phishing attacks: Securing spear attacks,” International Research Journal of Engineering and Technology, Vol. 6, No. 6, pp. 3054-3058, 2019.

A. A. Andryukhin, “Phishing attacks and preventions in blockchain based projects,” In 2019 International Conference on Engineering Technologies and Computer Science (EnT), IEEE, pp. 15-19, March 2019.

A. K. Jain, S. K. Yadav and N. Choudhary, “A novel approach to detect spam and smishing SMS using machine learning techniques,” International Journal of E-Services and Mobile Applications (IJESMA), Vol. 12, No. 1, pp. 21-38, 2020.

C. Singh, “Phishing Website Detection Based on Machine Learning: A Survey,” In 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, pp. 398-404, March 2020.

Aldwairi, M., & Tawalbeh, L. A. (2020). Security techniques for intelligent spam sensing and anomaly detection in online social platforms. International Journal of Electrical and Computer Engineering, Vol. 10, No. 1, pp. 275.

A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil and K. Kifayat, “A comprehensive survey of AI-enabled phishing attacks detection techniques,” Telecommunication Systems, Vol. 76, No. 1, pp. 139-154, 2021.




How to Cite

Sohidul Islam, M., Sajjad, M., Mahmudul Hasan, M., & Sakib Islam Mazumder, M. (2023). Phishing Attack Detecting System Using DNS and IP Filtering. Asian Journal of Computer Science and Technology, 12(1), 16–20.