A Secure Web-Based Cyber Defense Framework using AES Encryption, Steganography and Machine Learning
DOI:
https://doi.org/10.15680/IJCTECE.2025.0806013Keywords:
Phishing Detection, Smishing Prevention, Image Steganography, Cryptographic Techniques, Cyber Security, Data Hiding, Stego-Cryptography, Social Engineering AttackAbstract
This Approach is a comprehensive, web-based cybersecurity system combining file encryption, phishing URL detection, and SMS threat analysis to deliver robust protection against modern cyber threats. The system integrates three core components: (1) AES-256 file encryption with stenographic key hiding via the LSB technique in images, (2) phishing detection using a gradient boosting classifier trained on 30+ URL features, and (3) SMS threat analysis using NLP and sentiment analysis. Bootstrap was used for a responsive UI, with secure authentication implemented for user access. Testing included 500+ phishing URLs, 200+ SMS messages, and various file types. The phishing module achieved 95.2% accuracy by analyzing URL structure, domain reputation, and content. The SMS threat analyzer detected social engineering threats with 92.8% accuracy using keyword and linguistic pattern recognition. The encryption module successfully embedded and retrieved keys in 100% of tests. The platform delivered fast performance with an average response time of 2.3 seconds and received an 89% user satisfaction rate for its intuitive interface. Overall, the system offers a high-accuracy, user-friendly, and multi-layered cyber-security solution, suitable for individuals and organizations seeking advanced digital protection.
References
1. Sindhu, R., & Singh, P. (2020). Information Hiding using Steganography. International Journal of Engineering and Advanced Technology, 9(4), 1549-1554.ijeat+1
2. Sumathi, C.P., Santanam, T., & Umamaheswari, G. (2013). A Study of Various Steganographic Techniques Used for Information Hiding. International Journal of Computer Science & Engineering Survey, 4(6), 9-22.arxiv
3. Parvez, M.T., & Gutub, A.A. (2024). A novel technique for image steganography based on maximum... Multimedia Tools and Applications, 83, 1-13.link.springer
4. Yadav, R. (2023). A NEW METHOD FOR IMAGE STEGANOGRAPHY USING THE... International Journal of Computer Science and Mobile Computing, 12(2), 14-25.ijcsmc
5. Parvez, M.T., & Gutub, A. (2025). A novel and efficient digital image steganography technique using... Scientific Reports, 15, 1-15.nature
6. Pitropakis, N., Basbas, M., Dalatis, K., Doyamis, E., Srifi, M.D., & Katsikas, S. (2024). A systematic review and research challenges on phishing... Personal and Ubiquitous Computing, 28, 1-25.link.springer
7. Goel, D. (2024). Detection and Prevention of Smishing Attacks. arXiv preprint arXiv:2501.00260, 1-63.arxiv
8. Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2022). Digital image steganography: A literature survey. Information Sciences, 1-20.sciencedirect
9. Althobaiti, K., & Alsufyani, N. (2024). A review of organization-oriented phishing research. PMC, 1-15.pmc.ncbi.nlm.nih
10. Various. (2024). Smishing Detection: Combating SMS Phishing Attacks by Utilizing... SSRN, 1-10.papers.ssrn
11. Al-Nawasrah, A., Almomani, A.M., & Manasrah, A. (2025). A Survey on Phishing Attack Taxonomy, Detection Techniques... Journal of Network and Systems Management, 33, 1-20.tandfonline
12. Shabir, M.Y., Zubair, M., Khan, M.A., & Asad, M.U. (2023). A Case Study on Smishing: An Assessment of Threats against... Proceedings of the ACM Conference, 1-10.acm
13. Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Frontiers in Computer Science, 3, 1-15.frontiersin
14. Various. (2024). Analysing The Impact of Smishing Attack in Public Announcement... Procedia Computer Science, 1-10.sciencedirect
15. Pitropakis, N., Basbas, M., Dalatis, K., Doyamis, E., Srifi, M.D., & Katsikas, S. (2023). Mitigation strategies against the phishing attacks. Computers & Security, 1-25.sciencedirect

