Skip to main content

Email Phishing Detection Using AI and ML

  • Conference paper
  • First Online:
Deep Sciences for Computing and Communications (IconDeepCom 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2176))

  • 141 Accesses

Abstract

Phishing is the act of attackers sending malicious emails to receivers in an effort to trick them into falling for a con. Normally, the intention is to persuade users to provide private information, such as system logins or financial data. Our project investigates such email phishing attacks using AI and ML to get a reasonable conclusion about which algorithm can spot these attacks the most successfully.

In terms of cybersecurity, a phishing attack is a cybercrime that aims to obtain a user’s personal information in order to carry out some destructive actions. This attack’s effects could lead to account takeover, privilege escalation, and other issues. And in order to lessen it, this study provides information on how to spot phishing emails so that businesses can correctly deal with them.

Natural Language Processing (NLP) [26], logistic regression, and fundamental AI ideas like CNN [27] are used, along with machine learning algorithms like KNN, Naive Bayers, and these. This study aims to identify the optimal machine learning algorithm that would provide the highest level of accuracy when it comes to phishing email detection.

“To improve the accuracy of detecting phishing emails we have implemented CNN which is an effective approach to fulfill the target. CNN [27] can learn to recognize tiny patterns and traits that may be challenging for humans to notice, they can be a great tool for detecting phishing emails. Handling this technique is very important, hence LSTM is introduced”. The CNN model’s LSTM [27] can be thought of as its brain. LSTM (Long Short-Term Memory) [27] is a form of recurrent neural network (RNN) that is frequently employed in tasks involving sequence prediction and natural language processing (NLP) [26]. It is intended to solve the vanishing gradients issue, which can arise in conventional RNNs when the gradients are extremely small and make the network struggle to learn long-term dependencies.

By understanding and executing everything we have observed that Logistic Regression is giving us the highest of 97.49% accuracy followed by KNN at 94%. This proves that how effective the model is been while handling the data and also detecting phishing emails.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shabnam Sharma, study on phishing attack

    Google Scholar 

  2. Sharma, P., Dash, B., Ansari, M.: Anti phishing techniques. IJ ARCCCE (2022)

    Google Scholar 

  3. Ansari, M.F., Sharma, P.K., Dash, B.: Prevention of phishing attacks using AI-based cybersecurity awareness training. Int. J. Smart Sensor Adhoc Netw. 3, 61–72 (2022)

    Article  Google Scholar 

  4. Adil, M., Khan, R., Nawaz Ul Ghani, M.A.: Preventive techniques of phishing attacks in networks

    Google Scholar 

  5. Vitthal limbore, N., Todkar, R.S, Zargad, B.B,: a study of preventive measure of phishing attacks with reference to email websites (2014)

    Google Scholar 

  6. Basit, A., Zafar, M., Liu, X., Javed, A.R.: A comprehensive survey of AI-enabled phishing attacks detection techniques (2021)

    Google Scholar 

  7. Basit, A., Zafar, M., Jalil, Z.: A Review of Website Phishing Attack Detection Methods (2020)

    Google Scholar 

  8. Sahingoz, O.K., Buber, E., Diri, B.: Machine learning based phishing detection from URLs (2019)

    Google Scholar 

  9. Zhang, Z., Yeun, C.Y., Damiani, E.: Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research (2022)

    Google Scholar 

  10. Basit, A., Zafar, M., Rehman Javed, A., Jalil, Z.: A Novel Ensemble MachineLearning Method to Detect Phishing Attack

    Google Scholar 

  11. Verizon, Data Breach Report (2016)

    Google Scholar 

  12. Andronicus, A., Akinyelu, Adewumi, A.O.: Classification of Phishing

    Google Scholar 

  13. Email using Random forest Machine Learning Technique (2014)

    Google Scholar 

  14. Jameel, N.G.M., George, L.E.: Detection of phishing emails using feed forward neural network. Int. J. Compu. Appl. 77(7), 10–15 (2013). https://doi.org/10.5120/13405-1057

    Article  Google Scholar 

  15. Fette, I., Sadeh, N., Tomasi, A.: Learning to detect phishing emails. In: Proceedings of the )International World Wide Web Conference (WWW) (2006)

    Google Scholar 

  16. Park, G., Taylor, J.M.: Using Syntactic Features for Phishing Detection (2015). https://arxiv.org/pdf/1506.00037#:~:text=This%20experiment%20aimed%20to%20investigate,phishing%20emails%20and%20legitimate%20emails

  17. Gori Mohamed, J., Mohammed Mohideen, M., Banu, S.: Email Phishing – An open threat to everyone. Int. J. Sci. Res. Publ. 4, 1–4 (2014)

    Google Scholar 

  18. Emilin Shyni, C., Sarju, S., Swamynathan, S.: A multi-classifier based prediction model for phishing emails detection using topic modelling, named entity recognition and image processing. Circuits Syst. 07(09), 2507–2520 (2016)

    Article  Google Scholar 

  19. Jameel, N.G.M., George, L.E.: Detection phishing emails using features decisive values. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 257–259 (2014)

    Google Scholar 

  20. Verma, R., Rai, N.: Phish-IDetector: Message-ID based automatic phishing detection. In: 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), pp. 427–434. Colmar, France (2015)

    Google Scholar 

  21. Basnet. R., Mukkamala, S., Sung, A.H.: Detection of phishing attacks: a machine learning approach. In: Prasad, B. (eds.), Soft Computing Applications in Industry. Studies in Fuzziness and Soft Computing, vol. 226. Springer, Berlin, Heidelberg (2008). https://doi.org/10.1007/978-3-540-77465-5_19

  22. Karthikeyan, H., Usha, G.: An efficient hybrid message authentication scheme in vehicular ad hoc networks. Int. J. of Recent Technol. Eng. 8(2 Special Issue 4), 258–262 (2019). https://doi.org/10.35940/ijrte.B1048.0782S419

  23. Yasin, A., Abuhasan, A.: An intelligent classification model for phishing email detection. Int. J. Netw. Secur. Appl. 8(4), 55–72 (2016). https://doi.org/10.5121/ijnsa.2016.8405

    Article  Google Scholar 

  24. NIST Information Technology Laboratory Resource Center lossary. Nortan USA Types of phishing attacks and example

    Google Scholar 

  25. Karthikeyan, H., Usha, G.: Real-time DDoS flooding attack detection in intelligent transportation systems. Comput, Electr. Eng. 101, 107995 (2022). https://doi.org/10.1016/j.compeleceng.2022.107995. (https://www.sciencedirect.com/science/article/pii/S0045790622002634)

  26. Wang, Z.Q., Zhang. D.K.: HIDS and NIDS Hybrid Intrusion Detection System Model Design.

    Google Scholar 

  27. Usha, G., Kannimuthu, S., Vinoth, N.A.S., Karthikeyan, H.: Augmentation and orchestration of security techniques in fog computing. Int. J. Recent Technol. Eng. 8(2 Special Issue 4), 143–148(2019). https://doi.org/10.35940/ijrte.B1025.0782S419 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85073360770&doi=10.35940%2fijrte.B1025.0782S419&partnerID=40&md5=0490c58080aac3ef5152e1f7f2c14480

  28. Singh, S., Khatter, K.: Natural language processing: state of the art. current trends and challenges

    Google Scholar 

  29. Deep Sentiment Representation Based on CNN and LSTM

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Balachander .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sarkar, S., Yadav, A., Balachander, T. (2024). Email Phishing Detection Using AI and ML. In: R., A.U., et al. Deep Sciences for Computing and Communications. IconDeepCom 2023. Communications in Computer and Information Science, vol 2176. Springer, Cham. https://doi.org/10.1007/978-3-031-68905-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-68905-5_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-68904-8

  • Online ISBN: 978-3-031-68905-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics