Detection of Phishing Emails using Data Mining Algorithms

被引:0
|
作者
Smadi, Sami [1 ]
Aslam, Nauman [1 ]
Zhang, Li [1 ]
Alasem, Rafe [2 ]
Hossain, M. A. [3 ]
机构
[1] Northumbria Univ, Fac Engn & Environm, Dept Comp Sci & Digital Technol, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
[2] Imam Mohammad Ibn Saud Islam Univ, Fac Engn, Dept Elect Engn, Riyadh, Saudi Arabia
[3] Anglia Ruskin Univ, Fac Sci & Technol, Anglia Ruskin IT Res Inst, Cambridge, England
来源
2015 9TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA) | 2015年
关键词
Phishing; Classification algorithms; Data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes an intelligent model for detection of phishing emails which depends on a preprocessing phase that extracts a set of features concerning different email parts. The extracted features are classified using the J48 classification algorithm. We experimented with a total of 23 features that have been used in the literature. Ten-fold cross-validation was applied for training, testing and validation. The primary focus of this paper is to enhance the overall metrics values of email classification by focusing on the preprocessing phase and determine the best algorithm that can be used in this field. The results show the benefits of using our preprocessing phase to extract features from the dataset. The model achieved 98.87% accuracy for the random forest algorithm, which is the highest registered so far for an approved dataset. A comparison of ten different classification algorithms demonstrates their merits and capabilities through a set of experiments.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails
    Stojnic, Tatyana
    Vatsalan, Dinusha
    Arachchilage, Nalin A. G.
    SECURITY AND PRIVACY, 2021, 4 (05)
  • [22] The role of conscientiousness and cue utilisation in the detection of phishing emails in controlled and naturalistic settings
    Williams, Rohan
    Morrison, Ben W.
    Wiggins, Mark W.
    Bayl-Smith, Piers
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2024, 43 (09) : 1842 - 1858
  • [23] Profiling phishing activity based on hyperlinks extracted from phishing emails
    Yearwood, John
    Mammadov, Musa
    Webb, Dean
    SOCIAL NETWORK ANALYSIS AND MINING, 2012, 2 (01) : 5 - 16
  • [24] Data Mining Algorithms for Traffic Interruption Detection
    Karnati, Yashaswi
    Mahajan, Dhruv
    Rangarajan, Anand
    Ranka, Sanjay
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON VEHICLE TECHNOLOGY AND INTELLIGENT TRANSPORT SYSTEMS (VEHITS), 2020, : 106 - 114
  • [25] Predicting susceptibility to social influence in phishing emails
    Parsons, Kathryn
    Butavicius, Marcus
    Delfabbro, Paul
    Lillie, Meredith
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 128 : 17 - 26
  • [26] Outlier Detection Algorithms in Data Mining Systems
    M. I. Petrovskiy
    Programming and Computer Software, 2003, 29 : 228 - 237
  • [27] How Experts Detect Phishing Scam Emails
    Wash R.
    Proceedings of the ACM on Human-Computer Interaction, 2020, 4 (CSCW2)
  • [28] Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)
    Duque, Solane
    bin Omar, Mohd Nizam
    COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 46 - 51
  • [29] Individual processing of phishing emails How attention and elaboration protect against phishing
    Harrison, Brynne
    Svetieva, Elena
    Vishwanath, Arun
    ONLINE INFORMATION REVIEW, 2016, 40 (02) : 265 - 281
  • [30] Artificial Intelligence and Pattern Recognition Using Data Mining Algorithms
    Al-Shamiri, Abdulkawi Yahya Radman
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (07): : 221 - 232