Uncovering the Efficiency of Phishing Detection: An In-depth Comparative Examination of Classification Algorithms
Main Article Content
Abstract
This research aims to investigate the potential security risks associated with phishing email attacks and compare the performance of three main classification algorithms: random forest, SVM, and a combination of k-fold cross-validation with the xgboost model. The dataset consists of 18,634 emails, with 7,312 identified as phishing emails and 11,322 considered safe. Through experiments, the combination of k-fold cross-validation and xgboost demonstrated the best performance with the highest accuracy of 0.9712828770799785. The email classification graph provides a visual insight into the distribution of classification results, aiding in understanding patterns and trends in phishing attack detection. The analysis of the ROC curve results indicates that k-fold cross-validation and xgboost have a higher AUC compared to random forest and SVM, signifying a better ability to predict the correct class. The conclusion emphasizes the importance of the combination of k-fold cross-validation and xgboost in enhancing email security, with the potential for increased accuracy through parameter adjustments.
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with International Journal for Applied Information Management agree to the following terms: Authors retain copyright and grant the International Journal for Applied Information Management right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share (copy and redistribute the material in any medium or format) and adapt (remix, transform, and build upon the material) the work for any purpose, even commercially with an acknowledgement of the work's authorship and initial publication in International Journal for Applied Information Management. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in International Journal for Applied Information Management. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).