2016
DOI: 10.5121/ijnsa.2016.8405
|View full text |Cite
|
Sign up to set email alerts
|

An Intelligent Classification Model for Phishing Email Detection

Abstract: Phishing attacks are one of the trending cyber-attacks that apply socially engineered messages that are communicated to people from professional hackers aiming at fooling users to reveal their sensitive information, the most popular communication channel to those messages is through users' emails. This paper presents an intelligent classification model for detecting phishing emails using knowledge discovery, data mining and text processing techniques. This paper introduces the concept of phishing terms weighti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
44
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(46 citation statements)
references
References 30 publications
1
44
0
1
Order By: Relevance
“…In the retail industry, salespeople can build predictive models through data mining to understand who are most likely to respond to correspondence, thereby increasing sales. When enterprises apply data mining technologies, they should fully understand the advantages and disadvantages of various technologies and methods and select appropriate technologies for specific environments and tasks [16].…”
Section: Discussionmentioning
confidence: 99%
“…In the retail industry, salespeople can build predictive models through data mining to understand who are most likely to respond to correspondence, thereby increasing sales. When enterprises apply data mining technologies, they should fully understand the advantages and disadvantages of various technologies and methods and select appropriate technologies for specific environments and tasks [16].…”
Section: Discussionmentioning
confidence: 99%
“…The size of most email features is relatively small, except for features that rely on the vocabulary of the whole dataset like TFIDF [27]. Weighing the features with algorithms like Information Gain (IG) makes it possible to get subsets of features that give better classification results [165]- [171]. Figure 13 shows the classification and clustering methods used in the phishing email detection literature and the number of papers that employed them.…”
Section: B Email Feature Extraction and Analysismentioning
confidence: 99%
“…25 We refer to [90] where the authors built a dataset with emails from Wikileaks archives and Phishbowls from different universities. [167], [177], [179], [180] [162], [163], [165], [166], [171], [184] [161], [188]- [190], [192], [196], [197] [168]- [170], [173], [178], [186], [195] [176], [181]…”
Section: Dataset Properties 1) Dataset Sources and Availabilitymentioning
confidence: 99%
“…Phishing email detection. Classifiers are also used to determine phishing emails [18], [38]. In this case, the attack information is the content of the body of an email, such as links and words.…”
Section: Applicability To Other Attack Informationmentioning
confidence: 99%