Phishing detection using Machine learning and Deep learning techniques: A review

Authors

  • Maral Saleh Engineering Faculty, Kirkuk University, Street, Kirkuk, Iraq
  • Seda Şahin Engineering Faculty, University, Uluyazı, Çankırı, Türkiye

Keywords:

Phishing Detection, Machine Learning, Deep Learning, Cybersecurity, Feature Engineering

Abstract

Cyber criminals have not ceased to develop new ways of attacking users of the cyberspace, this is sees in the continuous style of phishing attacks. This paper aims at providing a comprehensive overview of the latest state-of-art in the development and implementation of phishing detection system with particular emphasis on the use of machine learning and deep learning methods. The review includes a wide variety of studies, comparing the characteristics of various system architectures, algorithms, applications, and implementation tools used in the development of recommender systems. Discovery includes massive trends in development of new combined deep learning models, an identification of feature engineering and data preprocessing as significant steps in developing DL models, and identification of brand-new approaches to ease the learning of deep learning such as visual similarity analysis, and semantic analysis of texts. The review also notes that heightened user awareness and education helps make users who are targeted by phishing more resilient while pointing out that the benefits of blockchain technology in improving cyberspace security and meaningfully advancing cooperation continue to remain enormous. This paper offers an extensive assessment of the existing literature on phishing detection, as well as sheds light on possible future research directions that are more effective in fight against this increasingly looming menace.

Downloads

Published

2024-09-07

How to Cite

Maral Saleh, & Seda Şahin. (2024). Phishing detection using Machine learning and Deep learning techniques: A review. Journal of Computational Analysis and Applications (JoCAAA), 33(08), 894–902. Retrieved from https://eudoxuspress.com/index.php/pub/article/view/1493

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.