Detection of Phishing Emails using Data Mining Algorithms

被引:0
|
作者
Smadi, Sami [1 ]
Aslam, Nauman [1 ]
Zhang, Li [1 ]
Alasem, Rafe [2 ]
Hossain, M. A. [3 ]
机构
[1] Northumbria Univ, Fac Engn & Environm, Dept Comp Sci & Digital Technol, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
[2] Imam Mohammad Ibn Saud Islam Univ, Fac Engn, Dept Elect Engn, Riyadh, Saudi Arabia
[3] Anglia Ruskin Univ, Fac Sci & Technol, Anglia Ruskin IT Res Inst, Cambridge, England
来源
2015 9TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA) | 2015年
关键词
Phishing; Classification algorithms; Data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes an intelligent model for detection of phishing emails which depends on a preprocessing phase that extracts a set of features concerning different email parts. The extracted features are classified using the J48 classification algorithm. We experimented with a total of 23 features that have been used in the literature. Ten-fold cross-validation was applied for training, testing and validation. The primary focus of this paper is to enhance the overall metrics values of email classification by focusing on the preprocessing phase and determine the best algorithm that can be used in this field. The results show the benefits of using our preprocessing phase to extract features from the dataset. The model achieved 98.87% accuracy for the random forest algorithm, which is the highest registered so far for an approved dataset. A comparison of ten different classification algorithms demonstrates their merits and capabilities through a set of experiments.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Comparison of Classification Algorithms for Detection of Phishing Websites
    Vaitkevicius, Paulius
    Marcinkevicius, Virginijus
    INFORMATICA, 2020, 31 (01) : 143 - 160
  • [32] The Optimal Application of the Algorithms of Detection and Data Mining in Honeynet
    Dong Nanping
    Zhou Guanling
    Wang Yuping
    2009 IITA INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING, PROCEEDINGS, 2009, : 13 - 16
  • [33] Eyes on phishing emails: an eye-tracking study
    Ribeiro, Liliana
    Guedes, Ines Sousa
    Cardoso, Carla Sofia
    JOURNAL OF EXPERIMENTAL CRIMINOLOGY, 2024,
  • [34] CULTURAL COMPARISON TOWARDS USERS' SUSCEPTIBLE TO PHISHING EMAILS
    Alseadoon, Ibrahim Mohammed
    Othman, Mohd Fairuz Iskandar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 240 - 244
  • [35] Breast Cancer Prediction and Detection Using Data Mining Classification Algorithms: A Comparative Study
    Kaya Keles, Mumine
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2019, 26 (01): : 149 - 155
  • [36] A cognitive approach to the decision to trust or distrust phishing emails
    Arduin, Pierre-Emmanuel
    INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2023, 30 (03) : 1263 - 1298
  • [37] A comparison among data mining algorithms for outlier detection using flow pattern experiments
    Vaghefi, M.
    Mahmoodi, K.
    Akbari, M.
    SCIENTIA IRANICA, 2018, 25 (02) : 590 - 605
  • [38] Block structure of data mining algorithms
    Zaynidin, Karshiev
    Kholod, Ivan
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT), 2016,
  • [39] More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails
    Roepke, Rene
    Drury, Vincent
    Peess, Philipp
    Johnen, Tobias
    Meyer, Ulrike
    Schroeder, Ulrik
    GAMES AND LEARNING ALLIANCE, GALA 2022, 2022, 13647 : 118 - 126
  • [40] Survey of Intrusion Detection Methods Based on Data Mining Algorithms
    Jin, Zichuan
    Cui, Yanpeng
    Yan, Zheng
    BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100