ExplorerData ScienceMachine Learning
Research PaperResearchia:202603.20055

Robustness, Cost, and Attack-Surface Concentration in Phishing Detection

Julian Allagan

Abstract

Phishing detectors built on engineered website features attain near-perfect accuracy under i.i.d.\ evaluation, yet deployment security depends on robustness to post-deployment feature manipulation. We study this gap through a cost-aware evasion framework that models discrete, monotone feature edits under explicit attacker budgets. Three diagnostics are introduced: minimal evasion cost (MEC), the evasion survival rate $S(B)$, and the robustness concentration index (RCI). On the UCI Phishing Web...

Submitted: March 20, 2026Subjects: Machine Learning; Data Science

Description / Details

Phishing detectors built on engineered website features attain near-perfect accuracy under i.i.d.\ evaluation, yet deployment security depends on robustness to post-deployment feature manipulation. We study this gap through a cost-aware evasion framework that models discrete, monotone feature edits under explicit attacker budgets. Three diagnostics are introduced: minimal evasion cost (MEC), the evasion survival rate S(B)S(B), and the robustness concentration index (RCI). On the UCI Phishing Websites benchmark (11,055 instances, 30 ternary features), Logistic Regression, Random Forests, Gradient Boosted Trees, and XGBoost all achieve AUC0.979\mathrm{AUC}\ge 0.979 under static evaluation. Under budgeted sanitization-style evasion, robustness converges across architectures: the median MEC equals 2 with full features, and over 80% of successful minimal-cost evasions concentrate on three low-cost surface features. Feature restriction improves robustness only when it removes all dominant low-cost transitions. Under strict cost schedules, infrastructure-leaning feature sets exhibit 17-19% infeasible mass for ensemble models, while the median MEC among evadable instances remains unchanged. We formalize this convergence: if a positive fraction of correctly detected phishing instances admit evasion through a single feature transition of minimal cost cminc_{\min}, no classifier can raise the corresponding MEC quantile above cminc_{\min} without modifying the feature representation or cost model. Adversarial robustness in phishing detection is governed by feature economics rather than model complexity.


Source: arXiv:2603.19204v1 - http://arxiv.org/abs/2603.19204v1 PDF: https://arxiv.org/pdf/2603.19204v1 Original Link: http://arxiv.org/abs/2603.19204v1

Please sign in to join the discussion.

No comments yet. Be the first to share your thoughts!

Access Paper
View Source PDF
Submission Info
Date:
Mar 20, 2026
Topic:
Data Science
Area:
Machine Learning
Comments:
0
Bookmark