2022
DOI: 10.1109/access.2022.3183083
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques

Abstract: Every year, phishing results in losses of billions of dollars and is a major threat to the Internet economy. Phishing attacks are now most often carried out by email. To better comprehend the existing research trend of phishing email detection, several review studies have been performed. However, it is important to assess this is sue from different perspectives . None of the surveys have ever comprehensively studied the use of Natural Language Processing (NLP) techniques for detection of phishing except one th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(21 citation statements)
references
References 152 publications
0
21
0
Order By: Relevance
“…[7] describes common phishing attack vectors, data sources, and identi cation methods used to mitigate phishing attacks and [8] delves into the technical and individual attributes of phishing attacks, motivations behind them, and user characteristics. Authors [9] review deep learning algorithms for phishing mitigation, while [10] presents a literature review of phishing and antiphishing techniques, [11] and [12] focus on using natural language processing (NLP) techniques for detecting phishing emails and websites, respectively.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[7] describes common phishing attack vectors, data sources, and identi cation methods used to mitigate phishing attacks and [8] delves into the technical and individual attributes of phishing attacks, motivations behind them, and user characteristics. Authors [9] review deep learning algorithms for phishing mitigation, while [10] presents a literature review of phishing and antiphishing techniques, [11] and [12] focus on using natural language processing (NLP) techniques for detecting phishing emails and websites, respectively.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Despite this high number, it is challenging, if not impossible, to compare the results of one study with another. There are various reasons, but the main ones observed are the insufficient level of detail about the source of data (many times, the details about gathering the legitimate records are insufficient or missing) used by these studies or the lack of details related to data transformation and cleansing before using machine learning techniques [12]. Studies often overlook the importance of describing the data collection process and the adjustments performed, which are crucial to validate or compare the results between various researchers.…”
Section: Introductionmentioning
confidence: 99%
“…Studying and comparing the current state-of-art data preprocessing methods is very important due to the disparity in the model's performance with each method. Table 1 also shows a few papers that investigate the unsupervised learning models [25], [27]. In [27], the authors only study one type of unsupervised learning, such as k-means clustering.…”
Section: Introductionmentioning
confidence: 99%
“…Table 1 also shows a few papers that investigate the unsupervised learning models [25], [27]. In [27], the authors only study one type of unsupervised learning, such as k-means clustering. The authors in [25] study multiple unsupervised learning models.…”
Section: Introductionmentioning
confidence: 99%