CFP last date
20 January 2025
Reseach Article

Detection of E-Mail Phishing Attacks – using Machine Learning and Deep Learning

by Dhruv Rathee, Suman Mann
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 47
Year of Publication: 2022
Authors: Dhruv Rathee, Suman Mann
10.5120/ijca2022921868

Dhruv Rathee, Suman Mann . Detection of E-Mail Phishing Attacks – using Machine Learning and Deep Learning. International Journal of Computer Applications. 183, 47 ( Jan 2022), 1-7. DOI=10.5120/ijca2022921868

@article{ 10.5120/ijca2022921868,
author = { Dhruv Rathee, Suman Mann },
title = { Detection of E-Mail Phishing Attacks – using Machine Learning and Deep Learning },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2022 },
volume = { 183 },
number = { 47 },
month = { Jan },
year = { 2022 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number47/32244-2022921868/ },
doi = { 10.5120/ijca2022921868 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:11.760458+05:30
%A Dhruv Rathee
%A Suman Mann
%T Detection of E-Mail Phishing Attacks – using Machine Learning and Deep Learning
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 47
%P 1-7
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Phishing is the most prominent cyber-crime that uses camouflaged e-mail as a weapon. In simple words, it is defined as the strategy adopted by fraudsters in-order-to get private details from persons by professing to be from well-known channels like offices, bank, or a government organization. In this era of modernization, electronic mails are accustomed globally as communiqué channel for both private and professional purposes. The particulars exchanged over e-mails are often confidential and sensitive for example info of bank statements, payment bills, debit-credit reports, and authentication data. This makes e-mails precious for hackers because they can exploit these details for maleficent intends. The main goal of the attackers is to acquire personal details by deceiving the e-mail recipient to click noxious link or download the attachment under false pretences. In the last few years, there is an exponential rise in cyber threats including the major ones, phishing e-mails have result in huge monetary and identity losses. Several models have been developed to separate ham and phished e-mails but attackers are always trying new methods to invade the privacy of the people. Hence, there is dire need to perpetually develop new models or to upgrade the existing ones. The focus of the paper is to elaborate that specifically centers around on both machine-learning (ML) and deep-learning (DL) approaches for detecting phishing e-mails. It shows comparative analysis and assessment of various DL and ML models that were proposed in the last few decades to classify phishing e-mails at different stages of crime in a systematic manner. This paper discusses the problem’s concept, its explication, and the anticipated future directions.

References
  1. Ş. Şentürk, E. Yerli and İ. Soğukpınar, “E-mail phishing detection and prevention by using data mining techniques”, 2017 International Conference on Computer Science and Engineering (UBMK), pp. 707-712.
  2. Anti-Phishing Working Group. 2021. APWG Phishing Activity Trends Report [Online]. Available: https://docs.apwg.org/reports/apwg_trends_report_q1_2021.pdf
  3. Z Alkhalil, C Hewage, L Nawaf, I Khan, “Phishing Attacks: Recent Comprehensive Study and a New Anatomy - Frontiers in Computer Science”, 2021.
  4. Hong J., “The state of phishing attacks”, 2012, Communications of the ACM, vol. 55(1), pp. 74-81.
  5. Ibrahim, N. Al Herami, E. Al Naqbi, M. Aldwairi, “Detection and Analysis of Drive-by-Downloads and Malicious Websites”, 2019, Seventh International Symposium on Security in Computing and Communications (SSCC’19), Trivandrum, Kerala, India.
  6. Masri, R., Aldwairi, M. Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro. 8th International Conference on Information and Communication Systems (ICICS), Irbid, 336- 341, (2017). doi:10.1109/IACS.2017.7921994. https://doi.org/10.1109/ IACS.2017.7921994
  7. A. Hamid I.R., Abawajy J., “Hybrid Feature Selection for Phishing E-mail Detection”, 2011, International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2011), vol. 7017. Springer, Berlin, Heidelberg.
  8. Aburrous, M., Hossain, M. A., Thabatah, F. and Dahal, K. P., 2008, “Intelligent phishing website detection system using fuzzy techniques”, 3rd International Conference on Information & Communication Technologies: From Theory to Applications (ICCTA'08). New York: IEEE
  9. G. Varshney, M. Misra, and P. K. Atrey, 2016, “A survey and classification of web phishing detection schemes,” Secur. Commun. Networks, vol. 9, no. 18, pp. 6266–6284.
  10. Vijayalakshmi, M., Mercy Shalinie, S., Yang, M. H., & U., R. M., 2020, “Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions”, IET Networks, vol. 9(5), pp. 235–246.
  11. Said Salloum, TarekGaber, Sunil Vadera, Khaled Shaalan, 2021, “Phishing E-mail Detection Using Natural Language Processing Techniques: A Literature Survey”, Procedia Computer Science, vol. 189,2021, pp. 19-28.
  12. Alsariera, Y.A., Adeyemo, V.E., Balogun, A.O., Alazzawi, A.K., 2020, “AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites”. IEEE Access 2020, vol. 8, pp. 142532–142542.
  13. Fette, I., Sadeh, N., Tomasic, A., 2006, “Learning to Detect Phishing E-mails”, Technical report, Institute of Software Research International, School of Computer Science, Carneige Melon University.
  14. Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S., 2007, “Comparison of Machine Learning Techniques for Phishing Detection”. APWG eCrime Researchers Summit, Pittsburgh, USA.
  15. Rawal, Srishti&Rawal, Bhuvan&Shaheen, Aakhila& Malik, Shubham, 2017. “Phishing Detection in E-mails using Machine Learning. International Journal of Applied Information Systems”. 12, pp. 21-24.
  16. Hota, H. &Shrivas, A.K. &Hota, Rahul, 2018, “An Ensemble Model for Detecting Phishing Attack with Proposed Remove-Replace Feature Selection Technique”. Computer Science. Vol. 132.pp. 900-907.
  17. C. EmilinShyni, S. Sarju, S. Swamynathan, 2016, “A Multi-Classifier Based Prediction Model for Phishing E-mails Detection Using Topic Modelling, Named Entity Recognition and Image Processing”. Circuits and Systems, vol. 07, pp. 2507-2520.
  18. Sami Smadi, NaumanAslam, Li Zhang, RafeAlasem, M A Hossain, “Detection of Phishing E-mails using Data Mining Algorithms”, 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), 2015.
  19. Chandrasekaran M., Narayanan K. and Upadhyaya S., 2006, “Phishing E-mail Detection Based on Structural Properties”, first annual Symposium on Information Assurance: Intrusion Detection and Prevention, New York, pp. 2-8
  20. Sunil B. Rathod, Tareek M. Pattewar, 2015, “Content Based Spam Detection in E-mail using Bayesian Classifier”, IEEE ICCSP conference.
  21. Mbah, K. F. Lashkari, A. H., Ghorbani, A. A. “A phishing e-mail detection approach using machine learning techniques”, World Academy of Science, Engineering and Technology, Computer and Information Engineering, vol. 3(1), pp. 2333,
  22. G. Sonowal, “Phishing E-mail Detection Based on Binary Search Feature Selection”, 2020, SN Computer. Science, vol. 1.
  23. M. Jameel, Noor & George, Loay.,,“Detection of Phishing E-mails using Feed Forward Neural Network”., 2013 International Journal of Computer Applications.
  24. Y. Fang, C. Zhang, C. Huang, L. Liu and Y. Yang, 2019, "Phishing E-mail Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism," in IEEE Access, vol. 7, pp. 56329-56340.
  25. A. Aljofey, Q. Jiang, Q. Qu, M. Huang, and J.-P. Niyigena, 2020, “An Effective Phishing Detection Model Based on Character Level Convolutional Neural Network from URL,” Electronics, vol. 9, no. 9, p. 1514.
  26. Suman Mann etal. “Smart hospital using AI and IOT for covid-19 Pandemic” Smart Healthcare Monitoring Using IoT with 5G Challenges, Directions, and Future Predictions (1st ed.). CRC Press. https://doi.org/10.1201/9781003171829
  27. Y. Li, Z. Yang, X. Chen, H. Yuan, and W. Liu, 2019,“A stacking model using URL and HTML features for phishing webpage detection,” Future Gener. Comput Syst., vol. 94, pp. 27–39.
  28. Bagui, S., Nandi, D. & White, R. J. , 2021, “Machine Learning and Deep Learning for Phishing E-mail Classification using One-Hot Encoding. Journal of Computer Science”, vol. 17(7), pp. 610-623.
  29. Bagui, S., Nandi, D. & White, R. J. , 2021, “Machine Learning and Deep Learning for Phishing E-mail Classification using One-Hot Encoding. Journal of Computer Science”, vol. 17(7), pp. 610-623.
  30. P. Manojkumar, M. Suresh, Alim Al Ayub Ahmed, Hitesh Panchal, Christopher AsirRajan, A. Dheepanchakkravarthy, A. Geetha, B. Gunapriya, Suman Mann &Kishor Kumar Sadasivuni (2021) A novel home automation distributed server management system using Internet of Things, International Journal of Ambient Energy, DOI: 10.1080/01430750.2021.1953590.
  31. Akshay Chopra, Bhavya Chaudhary, Suman Mann, “Analysis of Security Issues in VoIP” International journal of computer application”, Volume 103 – No.8, October 2014
  32. Suman Mann, Tanya Jain, Aakash Vyas, “The Blockchain Revolution: Paradigm Shifts in Traditional Voting Practices”, International journal of computer application, Volume 176 – No. 37, July 2020.
  33. Anish Batra, Guneet Singh Sethi, Suman Mann,” Personalized Automation of Electrical and Electronic Devices Using Sensors and Artificial Intelligence—the Intelligizer System” Computational Intelligence: Theories, Applications and Future Directions - Volume I, 2019, Volume 798
  34. SakshiHooda, Suman Mann, “Sepsis-Diagnosed Patients’ In-Hospital Mortality Prediction Using Machine Learning: The Use Of Local Big Data-Driven Technique In The Emergency Department” International journal of grid and distributed computing, vol13, Issue 1 2020
  35. Kaushik, Anupama&Tayal, Devendra&Yadav, Kalpana. ”The Role of Neural Networks and Metaheuristics in Agile Software Development Effort Estimation”, 2020, International Journal of Information Technology Project Management. 11. 50-71. 10.4018/IJITPM.2020040104.
  36. Arora J., Tushir M. (2021) Performance Analysis of Different Kernel Functions for MRI Image Segmentation. In: Bansal P., Tushir M., Balas V., Srivastava R.(eds) Proceedings of International Conference on Artificial Intelligence and Applications. Advances in Intelligent Systems and Computing, vol 1164. Springer, Singapore.
  37. Jyoti Khurana, Vachali Aggarwal and Harjinder Singh.,“A Comparative Study of Deep Learning Models for Network Intrusion Detection”, International Journal of Computer Applications, 174(23):38-46, March 2021.
Index Terms

Computer Science
Information Sciences

Keywords

Email Phishing Phishing Machine Learning Deep Learning