Machine Learning Classifier Performance Comparison for Phishing Detection
Abstract
Technology has advanced at a remarkable rate in recent decades, making communication simpler. Emails are the most effective method for both casual and formal conversations when compared to other forms of communication. Emails are a common form of communication for both business and personal purposes. Unfortunately, emails are also used to annoy internet users by sending viruses, spam, and ads. Spam emails are those sent by some undesirable users, also referred to as spammers. Some individuals misuse this kind of communication by sending spam emails that contain links to specific URLs for users to click on. Spam generates a number of issues, some of which may result in financial losses. Phishing is a method for attempting to obtain sensitive data through fraudulent email or website solicitation. This study compares the effectiveness of different machine learning algorithms in identifying spam or phishing emails. Different performance criteria were taken into account when evaluating the models, and the outcomes were compared.
Published
Issue
Section
Submission of an original manuscript to the Journal of Computing Technologies and Creative Content (JTeC) will be taken to mean that it represents original work not previoussly published, that it is not being considered elsewhere for publication. All submitted articles that are published by JTeC cannot be published anywhere by the authors unless with the permission by JTeC Editors. JTeC reserves the right to the publications of the articles it published, and reserves the right to reuse the articles elsewhere for academic purposes, while still retaining the names of the original authors with the original articles.
JTeC takes the stance that the publication of scholarly research is meant to disseminate knowledge and in a not-for-profit regime, benefits neither publisher nor author financially. It sees itself as having obligation to its author and to society to make content available online now that the technology allows for such possibility.