Analisis Serangan Phising Dan Upaya Pencegahannya Pada Sistem Informasi

Authors

  • Fiqri Alwan Universitas Malikussaleh, Indonesia Author
  • Ramzi Al Pasha Universitas Malikussaleh, Indonesia Author
  • Eka Prasetya Kaspandiri Universitas Malikussaleh, Indonesia Author
  • Muhammad Dzaky Al Fariz Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i2.177

Keywords:

Phishing, Cybersecurity, URL Analysis, Machine Learning, Social Engineering.

Abstract

Phishing attacks continue to evolve into increasingly complex cyber threats, particularly with the emergence of Generative Artificial Intelligence (GenAI) technologies capable of producing realistic fraudulent content. This study highlights the ineffectiveness of traditional blacklist-based security methods in countering dynamic attacks that exploit both technical and psychological vulnerabilities of users. The objective of this research is to analyze the technical characteristics and masquerading patterns of current phishing attacks. Using a descriptive qualitative approach, this study examines 14 active phishing URL samples from the 2024-2025 period through URL Feature Analysis. The results indicate that 80% of the samples have adopted the HTTPS protocol to manipulate user trust. Furthermore, the study identifies a dominance of typosquatting techniques and the abuse of cheap Top-Level Domains (TLDs) that often bypass standard security detection. The research concludes that effective cyber defense requires the integration of adaptive strategies, combining intelligent Machine Learning-based detection systems with comprehensive security awareness training to mitigate risks associated with human error.

References

Barraclough, P., Fehringer, G., & Woodward, J. (2021). Intelligent cyber-phishing detection for online. Computers & Security, 104, 102123. https://doi.org/10.1016/j.cose.2020.102123

Cybersecurity Threats through Phishing Attacks Targeting Internal Staff, Mitigation and Prevention - Scientific Repository. (n.d.). https://repository.petra.ac.id/21393/

Jishnu, K. S., & Arthi, B. (2024). Real-time phishing URL detection framework using knowledge distilled ELECTRA.

Automatika, 65(4), 1621–1639. https://doi.org/10.1080/00051144.2024.2415797

Nalawade, V. S., Sanjay, B. N., Nanasaheb, M. P., Vikram, S. V., Khandeshwar, P. T., Nalawade, V. S., Sanjay, B. N., Nanasaheb, M. P., Vikram, S. V., & Khandeshwar, P. T. (2025). Prevention of phishing attack on various applications. International Journal on Advanced Computer Engineering and Communication Technology, 14(1), 359–363. https://doi.org/10.65521/ijacect.v14i1.533

Naqvi, B., Perova, K., Farooq, A., Makhdoom, I., Oyedeji, S., & Porras, J. (2023). Mitigation strategies against the phishing attacks: A systematic literature review. Computers & Security, 132, 103387. https://doi.org/10.1016/j.cose.2023.103387

Naz, A., Sarwar, M., Kaleem, M., Mushtaq, M. A., & Rashid, S. (2024). A comprehensive survey on social engineering- based attacks on social networks. International Journal of ADVANCED AND APPLIED SCIENCES, 11(4), 139–

https://doi.org/10.21833/ijaas.2024.04.016

Safi, A., & Singh, S. (2023). A systematic literature review on phishing website detection techniques. Journal of King Saud University - Computer and Information Sciences, 35(2), 590–611. https://doi.org/10.1016/j.jksuci.2023.01.004

Trisolvena, M. N., & Saputra, N. H. (2024). Phishing cyber security threats. Jurnal Improsci, 2(1), 38–48. https://doi.org/10.62885/improsci.v2i1.440

Wilk-Jakubowski, J. L., Pawlik, L., Wilk-Jakubowski, G., & Sikora, A. (2025). Machine learning and neural networks for phishing detection: A systematic review (2017–2024). Electronics, 14(18), 3744. https://doi.org/10.3390/electronics14183744

Rehman, A., Imtiaz, H., Javaid, A. B., & Muslih, M. (2024). Real-Time Phishing URL Detection Using Machine Learning.

Engineering Proceedings, 107(1), 108. https://doi.org/10.3390/engproc2024107108

Jabir, R., Le, J., & Nguyen, C. (2025). Phishing attacks in the age of generative artificial intelligence: A systematic review of human factors. AI, 6(8), 174. https://doi.org/10.3390/ai6080174

Adewumi, S. E., & Ani, U. D. (2025). Impact of detection accuracy rates on phishing email spikes: Towards more effective mitigation. Information Security Journal a Global Perspective, 34(4), 354–391. https://doi.org/10.1080/19393555.2025.2469519

Larena-Luengo, A., Herraiz, J. J. M., Ferrer-Oliva, M., & Medina-Merodio, J. (2025). Mapping the literature on the factors that influence cybersecurity. A bibliographic coupling analysis. Cogent Business & Management, 12(1). https://doi.org/10.1080/23311975.2025.2531265

Alhuzali, A., Alloqmani, A., Aljabri, M., & Alharbi, F. (2025). In-depth analysis of phishing email detection: Evaluating the performance of machine learning and deep learning models across multiple datasets. Applied Sciences, 15(6), 3396. https://doi.org/10.3390/app15063396

Brissett, A., & Wall, J. (2025). Machine learning and watermarking for accurate detection of AI-generated phishing emails.

Electronics, 14(13), 2611. https://doi.org/10.3390/electronics14132611

Abdin, Z., Hassan, M. M., Shin-E-Mustafa, M., & Islam, M. R. (2024). Real-time phishing URL detection framework using knowledge distilled ELECTRA. Global Journal of Engineering and Technology Advances, 19(2), 111–

https://doi.org/10.30574/gjeta.2024.19.2.0164

Downloads

Published

2026-06-01

How to Cite

Alwan, F. ., Pasha , R. A. ., Kaspandiri , E. P. ., & Fariz, M. D. A. . (2026). Analisis Serangan Phising Dan Upaya Pencegahannya Pada Sistem Informasi. JIKUM: Jurnal Ilmu Komputer, 2(2), 161-165. https://doi.org/10.62671/jikum.v2i2.177

How to Cite

Alwan, F. ., Pasha , R. A. ., Kaspandiri , E. P. ., & Fariz, M. D. A. . (2026). Analisis Serangan Phising Dan Upaya Pencegahannya Pada Sistem Informasi. JIKUM: Jurnal Ilmu Komputer, 2(2), 161-165. https://doi.org/10.62671/jikum.v2i2.177