A Web Protection Model Against Internationalized Domain Name Homograph Exploits
Munir S. Khan A. Athar F. Qadir M.M. Alzahrani K.J. Bekarystankyzy A. Al-Rasheed A.
2026Institute of Electrical and Electronics Engineers Inc.
IEEE Access
2026#141865 - 1876 pp.
Internationalized Domain Names (IDNs) enhance global accessibility by supporting Unicode characters in web addresses. However, this capability introduces new security vulnerabilities, particularly through homoglyph visually similar characters such as the Cyrillic ‘’ (U+ 0435) and the Latin ‘e’ (U+ 0065) which enable attackers to craft deceptive domain names. These IDN homograph exploits are increasingly used in phishing attacks, creating URLs that are visually indistinguishable from legitimate sites. As the adoption of IDNs continues across browsers and domain registries, the risk of such exploits grows. According to the IDC 2023 Global DNS Threat Report, 90% of organizations faced domain-based attacks, with average losses of $1.1 million per incident. In this study, we propose a web protection model for the real-time detection and mitigation of IDN homograph threats. Central to our model is the construction of Unisimchar, a dynamic homoglyph database that extends prior work by incorporating Unicode block-level structures and performing pixel-level similarity analysis using 32 x 32 glyph images. Unlike static or manually maintained lists, Unisimchar enables automated and scalable identification of confusable character pairs through a threshold-based visual matching algorithm. The model processes over 1 million domain names sourced from Majestic Million, Zone Files, and Daily Domains, revealing that 80% of homoglyph pairs occur within high-traffic domains worldwide, with regional concentrations observed in Pakistan and Europe. With multithreaded architecture, the model achieves domain-level detection within 0.07 seconds, making it suitable for real-time threat prevention. The comprehensive evaluation includes a human perception study to validate visual similarity thresholds and quantitative experiments using standard metrics such as precision, recall, and F1 score. The results demonstrate that our model significantly improves the accuracy of homoglyph detection compared to existing methods, offering a practical and extensible defense mechanism against modern IDN homograph exploits in the web ecosystem.
Domain name system , homoglyph , internationalized domain name homograph , unicode
Text of the article Перейти на текст статьи
The Islamia University of Bahawalpur, Department of Computer Science, Bahawalpur, 63100, Pakistan
CECOS University of Information Technology and Emerging Sciences, Department of Computer Science, Peshawar, 25000, Pakistan
Taif University, College of Applied Medical Sciences, Department of Clinical Laboratories Sciences, Taif, 21944, Saudi Arabia
School of Digital Technologies, Narxoz University, Almaty, 050035, Kazakhstan
Princess Nourah bint Abdulrahman University, College of Computer and Information Sciences, Department of Information Systems, P.O. Box 84428, Riyadh, 11671, Saudi Arabia
The Islamia University of Bahawalpur
CECOS University of Information Technology and Emerging Sciences
Taif University
School of Digital Technologies
Princess Nourah bint Abdulrahman University
10 лет помогаем публиковать статьи Международный издатель
Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026