CONCLUSION
The model was experimented to classify phishing email in an business organization,
once the three combination of features were determined from the mail dataset, then the
classification process was applied using selected algorithm and word embedding to get the
result. The model experimented gave the highest accuracy values of 100% by using random
forest algorithm, TF-IDF word embedding and subject as a feature. The result for deep
trained better.
It may be a future work to study the latest phishing trend from different sources of
dataset to gain better training and test result for the model, tuning the model parameter, and
input support for mixed language and writings in email such as japanese, mandarin, arabic
and other language.
BIBLIOGRAFI
Atawneh, S., & Aljehani, H. (2023). Phishing email detection model using deep learning.
Electronics, 12(20), 4261.
Breiman, L. (2001). Random forests. Machine Learning, 45, 532.
Chawla, S., Kaur, R., & Aggarwal, P. (2023). Text classification framework for short text
based on TFIDF-FastText. Multimedia Tools and Applications, 82(26), 4016740180.
Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V, Freire, M. M., & Inácio, P. R. M. (2014).
Security issues in cloud environments: a survey. International Journal of Information
Security, 13, 113170.
Ilie, V.--O., Apostol, E.-S., & Paschke, A. (2021). Context-aware misinformation
detection: A benchmark of deep learning architectures using word embeddings. IEEE
Access, 9, 162122162146.
Karim, A., Shahroz, M., Mustofa, K., Belhaouari, S. B., & Joga, S. R. K. (2023). Phishing
detection system through hybrid machine learning based on URL. IEEE Access, 11,
3680536822.
Khan, W. Z., Khan, M. K., Muhaya, F. T. Bin, Aalsalem, M. Y., & Chao, H.-C. (2015). A
comprehensive study of email spam botnet detection. IEEE Communications Surveys &
Tutorials, 17(4), 22712295.
Lai, S., Xu, L., Liu, K., & Zhao, J. (2015). Recurrent convolutional neural networks for text
classification. Proceedings of the AAAI Conference on Artificial Intelligence, 29(1).
and two-step classification strategy. Pattern Recognition, 48(7), 23182327.
Magdy, S., Abouelseoud, Y., & Mikhail, M. (2022). Efficient spam and phishing emails