2nd International Conference on Materials Science and Sustainable Manufacturing Technology
E-mail Spam Detection and Phishing link Detection Using Machine Learning
Keerthika J, Adisvara A, Akash S, Jayanesh B, Arul Prakash T, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.
Phishing, which tricks individuals into revealing delicatedata like login credentials and financial details, is the
most widespread type of cybercrime. Attackers typically use electronic mail, prompt messaging, and telephone calls to
initiate these attacks. Despite ongoing efforts to prevent phishing attacks, current measures are not entirely effective, as
the amount of phishing emails has enlarged significantly in current years. While numerous methods have been developed
to filter out phishing emails, there is still a need for a comprehensive solution. This survey is the first of its kind to
examine the use of N-L-P and ML methods for identifying phishing electronic mail. The analyzesof state_of_the_art N-
L-P approaches that are presently being used to detect phishing electronic mail at different periods of the outbreak, with a
focus on M-L methods. These methods are compared and evaluated in-depth.
D. Wu, L. Fan, C. Zhang, H. Wang, and R. Wang, “Dynamical Credibility Assessment of Privacy-Preserving Strategy for Opportunistic Mobile Crowd Sensing,” IEEE Access, vol. 6, pp. 37430–37443, 2018, doi: 10.1109/access.2018.2847251.
K. R. Jansi and S. V. Kasmir Raja, “A survey on Privacy Preserving Data Aggregation Schemes in People Centric Sensing Systems and Wireless Domains,” Indian Journal of Science and Technology, vol. 9, no. 37, Oct. 2016, doi: 10.17485/ijst/2016/v9i37/102072.
K. R. Jansi and S. V. Kasmir Raja, “Design Perspectives of People Centric Sensing Systems,” Indian Journal of Science and Technology, vol. 9, no. 37, Oct. 2016, doi: 10.17485/ijst/2016/v9i37/102076.
N. F. Rusland, N. Wahid, S. Kasim, and H. Hafit, “Analysis of Naïve Bayes Algorithm for Email Spam Filtering across Multiple Datasets,” IOP Conference Series: Materials Science and Engineering, vol. 226, p. 012091, Aug. 2017, doi: 10.1088/1757-899x/226/1/012091.
D. Sen, C. Das, and S. Chakraborty, “A New Machine Learning based Approach for Text Spam Filtering Technique,” Communications on Applied Electronics, vol. 6, no. 10, pp. 28–34, Apr. 2017, doi: 10.5120/cae2017652572.
K. R. Jansi, S. V. Kasmir Raja, and G. K. Sandhia, “Efficient privacy-preserving fault tolerance aggregation for people-centric sensing system,” Service Oriented Computing and Applications, vol. 12, no. 3–4, pp. 305–315, Sep. 2018, doi: 10.1007/s11761-018-0241-5.
T.-C. Chen, S. Dick, and J. Miller, “Detecting visually similar Web pages,” ACM Transactions on Internet Technology, vol. 10, no. 2, pp.1–38, May 2010, doi: 10.1145/1754393.1754394.
M. R. Wijaya, R. Saptono, and A. Doewes, “The Effect of Best First and Spreadsubsample on Selection of a Feature Wrapper With Naive Bayes Classifier for The Classification of the Ratio of Inpatients,” Scientific Journal of Informatics, vol. 3, no. 2, pp. 13 9–148, Nov. 2016, doi: 10.15294/sji.v3i2.7910.
Anjana Kumari, ”Study on Naive Bayesian Classifier and its relation to Information Gain,” International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 2, Issue- 3, pp.601 – 603,March 2014.
R. Shams and R. E. Mercer, “Classifying Spam Emails Using Text and Readability Features,” 2013 IEEE 13th International Conference on Data Mining, Dec. 2013, doi: 10.1109/icdm.2013.131
Cite this article
Keerthika J, Adisvara A, Akash S, Jayanesh B, Arul Prakash T, “E-mail Spam Detection and Phishing link Detection Using Machine Learning”, Advances in Computational Intelligence in Materials Science, pp. 047-053, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_9