“…The attacker then performs fraudulent transaction from the user's account using this collected information. [4], network and content based filtering [22], firewalls [4,21,22], client side tool bars [4,21,22], Server Side filters [21,22] and user awareness [22]. But the most critical issue with these current techniques is, when classifying email (text), often the data contained in emails are very complex, multidimensional, or represented by a large number of features.…”