Comparison of Deep Learning and Machine Learning Model for Phishing Email Classification
Abstract
Email is a medium in business communication that people use everyday and not only holds sensitive information but also identity for the user and organization. The uniqueness of information contained make phishing detection and remedy cannot be applied generally. Existing method applied in common on security software such as blacklisting keyword or email address is not enough to outpace evolving phishing method. Nowadays the implementation of machine learning and deep learning grow rapidly fast and the method used by machine learning and deep learning that can learn pattern of inputs and natural language processing making classification to detect email phishing promising, this study present proposed method of phishing mail classification by comparing the use of machine learning and deep learning model, The algorithm used in this paper are recurrent convolutional neural network and random forest with tf-idf and fasttext word embedding. The Dataset contain phishing and legitimate of an email gathered from a trading company in Indonesia. The dataset will be split into 70% for training and 30% for testing. As a result of this comparison, the random forest model with tf-idf word embedding achieve highest accuracy of 100% for the dataset used and the highest accuracy for recurrent convolutional neural network model with fasttext is 98.21%.
Downloads
Copyright (c) 2024 Randy Himawan, Amalia Zahra
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.