{"title":"基于机器学习技术的电子邮件网络钓鱼检测比较研究","authors":"Afiqah Aqilah Adzhar, Zulaile Mabni, Z. Ibrahim","doi":"10.1109/ICOCO56118.2022.10031671","DOIUrl":null,"url":null,"abstract":"Phishing Email can be described as an email that looks exactly like a legitimate email, but it is designed by phisher with an intention to deceive the email’s user. The purpose of phishing email is to trick email user to visit fake website that looks exactly like a real one or to trick user to download the available attachment in the email without knowing that they are downloading virus into their machine. As the number of phishing emails are increasing from day to day and due to the complexity in detecting phishing email, there are numbers of continuous researches that have been done to improve existing detection tools or to develop a new one. To provide a thorough understanding of phishing attacks, this paper provides a brief explanation on phishing email and phishing attack. This paper presents the comparison of previous studies in commonly used Supervised Machine Learning techniques on detecting the phishing email attack such as Decision Tree (DT), Naive Bayes (NB), Random Forest (RF), and Support Vector machine(SVM). The findings of this study concluded that SVM and RF are the best techniques that can be used to detect phishing email.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Comparative Study on Email Phishing Detection Using Machine Learning Techniques\",\"authors\":\"Afiqah Aqilah Adzhar, Zulaile Mabni, Z. Ibrahim\",\"doi\":\"10.1109/ICOCO56118.2022.10031671\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing Email can be described as an email that looks exactly like a legitimate email, but it is designed by phisher with an intention to deceive the email’s user. The purpose of phishing email is to trick email user to visit fake website that looks exactly like a real one or to trick user to download the available attachment in the email without knowing that they are downloading virus into their machine. As the number of phishing emails are increasing from day to day and due to the complexity in detecting phishing email, there are numbers of continuous researches that have been done to improve existing detection tools or to develop a new one. To provide a thorough understanding of phishing attacks, this paper provides a brief explanation on phishing email and phishing attack. This paper presents the comparison of previous studies in commonly used Supervised Machine Learning techniques on detecting the phishing email attack such as Decision Tree (DT), Naive Bayes (NB), Random Forest (RF), and Support Vector machine(SVM). The findings of this study concluded that SVM and RF are the best techniques that can be used to detect phishing email.\",\"PeriodicalId\":319652,\"journal\":{\"name\":\"2022 IEEE International Conference on Computing (ICOCO)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Computing (ICOCO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOCO56118.2022.10031671\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Computing (ICOCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOCO56118.2022.10031671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comparative Study on Email Phishing Detection Using Machine Learning Techniques
Phishing Email can be described as an email that looks exactly like a legitimate email, but it is designed by phisher with an intention to deceive the email’s user. The purpose of phishing email is to trick email user to visit fake website that looks exactly like a real one or to trick user to download the available attachment in the email without knowing that they are downloading virus into their machine. As the number of phishing emails are increasing from day to day and due to the complexity in detecting phishing email, there are numbers of continuous researches that have been done to improve existing detection tools or to develop a new one. To provide a thorough understanding of phishing attacks, this paper provides a brief explanation on phishing email and phishing attack. This paper presents the comparison of previous studies in commonly used Supervised Machine Learning techniques on detecting the phishing email attack such as Decision Tree (DT), Naive Bayes (NB), Random Forest (RF), and Support Vector machine(SVM). The findings of this study concluded that SVM and RF are the best techniques that can be used to detect phishing email.