Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models.

Sensors (Basel)

Department of Computer Science and Engineering, College of Applied Studies and Community Service, King Saud University, Riyadh 11495, Saudi Arabia.

Published: March 2024

Phishing is one of the most dangerous attacks targeting individuals, organizations, and nations. Although many traditional methods for email phishing detection exist, there is a need to improve accuracy and reduce false-positive rates. Our work investigates one-dimensional CNN-based models (1D-CNNPD) to detect phishing emails in order to address these challenges. Additionally, further improvement is achieved with the augmentation of the base 1D-CNNPD model with recurrent layers, namely, LSTM, Bi-LSTM, GRU, and Bi-GRU, and experimented with the four resulting models. Two benchmark datasets were used to evaluate the performance of our models: Phishing Corpus and Spam Assassin. Our results indicate that, in general, the augmentations improve the performance of the 1D-CNNPD base model. Specifically, the 1D-CNNPD with Bi-GRU yields the best results. Overall, the performance of our models is comparable to the state of the art of CNN-based phishing email detection. The Advanced 1D-CNNPD with Leaky ReLU and Bi-GRU achieved 100% precision, 99.68% accuracy, an F1 score of 99.66%, and a recall of 99.32%. We observe that increasing model depth typically leads to an initial performance improvement, succeeded by a decline. In conclusion, this study highlights the effectiveness of augmented 1D-CNNPD models in detecting phishing emails with improved accuracy. The reported performance measure values indicate the potential of these models in advancing the implementation of cybersecurity solutions to combat email phishing attacks.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11013960PMC
http://dx.doi.org/10.3390/s24072077DOI Listing

Publication Analysis

Top Keywords

phishing email
8
email detection
8
models phishing
8
email phishing
8
phishing emails
8
performance models
8
models
7
phishing
7
1d-cnnpd
6
performance
5

Similar Publications

Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat. Without a doubt, phishing is one of the rising concerns that leads to stealing vital information such as passwords, security codes, and personal data from any target node through communication hijacking techniques.

View Article and Find Full Text PDF

Objectives: Difficulties with deception detection may leave older adults especially vulnerable to fraud. Interoception, that is, the awareness of one's bodily signals, has been shown to influence deception detection, but this relationship has not been examined in aging yet. The present study investigated effects of interoceptive accuracy on 2 forms of deception detection: detecting interpersonal lies in videos and identifying text-based deception in phishing emails.

View Article and Find Full Text PDF

With technological advancements, financial exploitation tactics have expanded into the online realm. Older adults may be particularly susceptible to online scams due to age- and Alzheimer's disease-related changes in cognition. In this study, 182 adults ranging from 18 to 90 years underwent cognitive assessment, genotyping for apolipoprotein E e4 (APOE4), and completed the lab-based Short Phishing Email Suspicion Test (S-PEST) as well as the real-life PHishing Internet Task (PHIT).

View Article and Find Full Text PDF

Unsolicited scam invitations from predatory publications and fraudulent conferences: Radiology-in-training experience.

Clin Imaging

September 2024

Russell H. Morgan Department of Radiology and Radiological Science, Johns Hopkins Medical Institution, Baltimore, MD, United States of America.

Purpose: Radiology faculty across various specialties have been reported to receive an average of 20.7 invitations to submit manuscripts to bogus journals and 4.1 invitations to speak at unsuitable events over a two-week span.

View Article and Find Full Text PDF

This study investigated the roles of phishing knowledge, cue utilization, and decision styles in contributing to phishing email detection. Participants (N = 145) completed an online email sorting task, and measures of phishing knowledge, email decision styles, cue utilization, and email security awareness. Cue utilization was the only factor that uniquely predicted the capacity to discriminate phishing from genuine emails.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!