Classification of Phishing Attacks Using Machine Learning Algorithms: A Systematic Literature Review

Alhaji, Usman Muhammed and Adewumi, Sunday Eric and Yemi-peters, Victoria Ifeoluwa (2025) Classification of Phishing Attacks Using Machine Learning Algorithms: A Systematic Literature Review. Journal of Advances in Mathematics and Computer Science, 40 (1). pp. 26-44. ISSN 2456-9968

[thumbnail of Alhaji4012024JAMCS128845.pdf] Text
Alhaji4012024JAMCS128845.pdf - Published Version

Download (496kB)

Abstract

Phishing attacks have been a major threat to cyber security since they take advantage of human vulnerabilities rather than system setbacks, making them difficult to detect. Phishing attacks always involve fraudulent websites designed to mimic legitimate websites to steal sensitive information from victims. This research paper provides a comprehensive literature review to recommend future research. This review paper examines previous papers' application of machine learning (ML) algorithms to phishing detection, focusing on how ML can be used to turn phishing attack problems into classification tasks. This research compared the commonly used ML algorithms like Decision Trees (DT), Random Forest (RF), Support Vector Machines (SVM), Naïve Bayes (NB), k-means Clustering, and Artificial Neural Networks (ANN), these algorithms were compared based on their performance, strengths, and weakness. Key findings reveal that SVM excels with high-dimensional data, RF handles large datasets efficiently, and DT offers simplicity but struggles with complex features. Algorithm performance depends on data and feature selection.

This presents the need to develop hybrid or ensemble models to improve detection accuracy and reliability and contribute to stronger cybersecurity frameworks.

Item Type: Article
Subjects: East Asian Archive > Computer Science
Depositing User: Unnamed user with email support@eastasianarchive.com
Date Deposited: 10 Jan 2025 05:07
Last Modified: 10 Jan 2025 05:07
URI: http://library.reviewerhub.co.in/id/eprint/1558

Actions (login required)

View Item
View Item