Inspiration
The idea for this project stemmed from a very personal realization—no one is immune to cyber threats, not even tech enthusiasts like us. One of our team members once clicked on what seemed like a harmless link, only to realize later that their account had been compromised. It wasn’t just about embarrassment—it was about how easily anyone could fall for a cleverly disguised phishing attempt.
This made us think about how many people unknowingly face similar threats every day. The thought of creating something that could prevent such incidents, especially for less tech-savvy users, really struck a chord with us. We wanted to build a tool that wasn’t just effective but also simple enough for anyone to use.
What it does
Our tool, Phishguard, acts like a vigilant friend who always has your back while you’re online. It doesn’t just sit silently and wait for things to go wrong—it actively scans the links and emails you interact with, trying to spot anything suspicious or harmful.
Think of it as a personal online bodyguard. If you’re about to click on a shady link or open a potentially harmful email, it steps in with a gentle nudge:
“Hey, this link seems off. Are you sure you want to open it?”
Here’s how it feels like working with a human:
It Watches, But Doesn’t Intrude: It’s not overbearing. It lets you browse and interact freely but stays alert in the background, ready to step in if something seems wrong. It Explains in Plain English: Instead of overwhelming you with technical jargon, it tells you why something seems suspicious. For example: “This email is flagged because the sender's domain doesn’t match the official company’s website.” “This link redirects to an unknown site that could be harmful.” It Learns From Mistakes: Like a human, it gets better over time. If it flags something incorrectly, you can give feedback, and it adapts to become more accurate. It Respects Your Choices: Even if it warns you, the final decision is yours. It doesn’t block you outright but gives you the information you need to make an informed choice.
How we built it
Research We started with the basics: understanding phishing, cyberattacks, and how existing tools work. This step was an eye-opener. We discovered that while there are tools out there, many of them are either too complex or too passive to truly help users in real-time.
Collecting Data (The Hard Way) Finding a reliable dataset was tougher than we imagined. Most public datasets had outdated or irrelevant examples. We had to manually sort through data, cleaning and categorizing it, which felt like finding a needle in a haystack. But it taught us patience and persistence.
Training the AI This part tested our technical limits. At first, our model flagged almost everything as suspicious—even our own emails! But we kept tweaking, fine-tuning, and testing until it started getting things right.
Real-Time Monitoring We wanted the tool to feel invisible yet protective, like a guardian angel. Building a system that could monitor emails and links without draining the user’s system resources was a challenge, but we managed by optimizing every line of code.
User Experience We knew that no matter how powerful the tool was, people wouldn’t use it if it felt overwhelming. So, we designed a clean, simple interface where users could easily see and understand warnings without feeling intimidated.
Challenges we ran into
Imposter Syndrome: At times, we doubted whether we could pull this off. Cybersecurity felt like a massive, intimidating field, and it was easy to feel out of our depth.
Balancing Accuracy and Usability: The early versions of our tool were too strict, flagging even safe links. It was frustrating to see our own tool fail, but we treated every failure as a learning opportunity.
Real-World Testing: During testing, we realized how unpredictable real-world scenarios could be. Emails and links came in all shapes and sizes, and we had to constantly adapt our tool to handle edge cases.
Explaining the "Why": One of our biggest challenges was making users trust our tool without overwhelming them with technical jargon. It forced us to think deeply about how to communicate clearly and empathetically.
Accomplishments that we're proud of
From Idea to Reality We started with just an idea and a lot of uncertainty. None of us were cybersecurity experts, but we were passionate about solving a real problem. Seeing that idea transform into a working prototype felt like magic—it reminded us that with enough determination, we could bring something impactful to life.
Protecting Users in Real-Time The moment our tool successfully flagged its first phishing link during testing was a huge win. It wasn’t just code working; it was the realization that we’d created something that could genuinely protect people. That moment gave us a sense of purpose and made all the late nights worth it.
Making Cybersecurity Accessible One of our biggest goals was to make something that anyone could use, regardless of their technical background. When our friends and family tested the tool and said, “This makes me feel safer online!”—that was a moment of pure pride.
Building for Impact We know this tool won’t stop all cyberattacks, but we also know it can make a real difference. If even one person avoids a phishing scam because of our project, we’ll feel like we’ve achieved something meaningful.
Overcoming Imposter Syndrome At times, we doubted ourselves. Could we really build something valuable? Did we know enough? But every small success, from debugging errors to improving the model’s accuracy, reminded us that we were capable. This project showed us the power of persistence and teamwork.
What we learned
Cybersecurity is Both Art and Science I thought cybersecurity was all about technical jargon and complex algorithms, but I learned it’s also about psychology. Attackers prey on human behavior, so protecting users isn’t just about building smarter tools—it’s about understanding people and how they interact with technology.
The Power of AI in the Right Context I knew AI could do amazing things, but seeing it analyze and detect phishing attempts in real-time was eye-opening. It taught me how machine learning can be a game-changer when paired with a meaningful purpose. At the same time, I realized that AI is only as good as the data it learns from, which pushed me to be extra careful with dataset selection and model training.
Balancing Simplicity and Functionality I initially packed the tool with features, thinking more was better. But during testing, I learned that users value simplicity over complexity. This forced me to step back, strip away unnecessary features, and focus on making the tool intuitive and easy to use.
Failures Are Part of the Process Not everything worked the first time—or even the second or third time. The model misclassified emails, the UI crashed during integration, and I faced false positives during testing. But each failure taught me something new, and every roadblock became a stepping stone toward improvement.
Empathy Matters Creating a tool for people means stepping into their shoes. I realized that many users don’t understand cybersecurity threats in-depth, so I had to design with empathy, providing simple explanations and actionable insights. It reminded me that technology should serve people, not intimidate them.
The Value of User Feedback Testing with real users was humbling. I got feedback that I hadn’t even considered, like how some users felt overwhelmed by too many notifications. Listening to their experiences helped me refine the tool and made it much more user-friendly.
Resilience is Key There were moments when I doubted myself—when the project felt too big, or the deadlines felt too tight. But I kept going, learning to adapt, problem-solve, and stay focused on the end goal. This experience taught me that perseverance often beats expertise.
What's next for PhishGuard: AI-Powered Suspicious Link detection tool
Polishing and Refinement
Improve Accuracy: Fine-tune the AI model by expanding and diversifying the dataset. This can help reduce false positives and negatives, making the tool even more reliable. User Experience (UX): Simplify the interface further. Ensure that even non-tech-savvy users can understand alerts and take action confidently. Adding New Features
Phishing Database Integration: Integrate real-time threat intelligence feeds to detect emerging phishing threats. Cross-Platform Compatibility: Expand the tool to support mobile devices, browsers, and email clients. Language Support: Add multilingual capabilities to make the tool accessible to a global audience. Testing and Feedback
Conduct usability tests with a diverse group of users to gather more feedback. Run simulations of phishing attacks to evaluate the tool’s performance under different scenarios. Deployment
Host the tool online or package it as a downloadable application. Partner with email service providers, browsers, or cybersecurity firms to integrate the tool into their platforms. Marketing and Awareness
Create a simple website or landing page showcasing the tool’s features. Use social media and forums to raise awareness about phishing and promote your tool. Build tutorials or videos to educate users about cybersecurity and how to use the tool effectively.
Exploring Opportunities
Submit your project to hackathons, cybersecurity competitions, or innovation challenges for feedback, exposure, and funding. Reach out to potential collaborators or mentors in the cybersecurity industry to guide future development. Scaling the Project
Look into partnerships with organizations (schools, companies) to implement the tool on a larger scale. Explore integration with other tools, like antivirus software or productivity platforms, to enhance its reach and impact.
Built With
- amazon-web-services
- beautiful-soup
- browser-extension
- desktop
- figma
- flask/django
- github
- heroku
- html/css
- javascript
- mongodb
- openai
- postman
- python
- scikit-learn
- sqlite
- tensorflow
- virustotal-api
Log in or sign up for Devpost to join the conversation.