Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Phishing Detection in E-mails using Machine Learning

Srishti Rawal, Bhuvan Rawal, Aakhila Shaheen, Shubham Malik in Security

International Journal of Applied Information Systems
Year of Publication: 2017
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors:Srishti Rawal, Bhuvan Rawal, Aakhila Shaheen, Shubham Malik
Download full text
  1. Srishti Rawal, Bhuvan Rawal, Aakhila Shaheen and Shubham Malik. Phishing Detection in E-mails using Machine Learning. International Journal of Applied Information Systems 12(7):21-24, October 2017. URL, DOI BibTeX

    	author = "Srishti Rawal and Bhuvan Rawal and Aakhila Shaheen and Shubham Malik",
    	title = "Phishing Detection in E-mails using Machine Learning",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "October 2017",
    	volume = 12,
    	number = 7,
    	month = "October",
    	year = 2017,
    	issn = "2249-0868",
    	pages = "21-24",
    	url = "",
    	doi = "10.5120/ijais2017451713",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"


Emails are widely used as a means of communication for personal and professional use. The information exchanged over mails is often sensitive and confidential such as banking information, credit reports, login details etc. This makes them valuable to cyber criminals who can use the information for malicious purposes. Phishing is a strategy used by fraudsters to obtain sensitive information from people by pretending to be from recognized sources. In a phished email, the sender can convince you to provide personal information under false pretenses. This experimentation considers the detection of a phished email as a classification problem and this paper describes the use of machine learning algorithms to classify emails as phished or ham. Maximum accuracy of 99. 87% is achieved in classification of emails using SVM and Random Forest classifier.


  1. Verizon, Data Breach Report 2016
  2. Andronicus A. Akinyelu and Aderemi O. Adewumi. Classification of Phishing Email using Random forest Machine Learning Technique 2014.
  3. Noor Ghazi M. Jameel, Loay E. George. Detection of Phishing Emails using Feed Forward Neural Network, International Journal of Computer Applications 2013.
  4. Ian Fette, Norman Sadeh, Anthony Tomasi, Learning to Detect Phishing Emails, In Proceedings of the International World Wide Web Conference (WWW), 2006
  5. Gilchan Park, Julia M. Taylor, Using Syntactic Features for Phishing Detection 2015,
  6. Gori Mohamed .J, M. Mohammed Mohideen, Mrs. Shahira Banu. Email Phishing - An open threat to everyone, International Journal of Scientific Research Publications, 2014
  7. C. Emilin Shyni, S. Sarju, S. Swaminathan A Multi-Classifier Based Prediction Model for Phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing, SciRes 2016
  8. Noor Ghazi M. Jamee , Loay E. George (2014), “Detection Phishing Emails Using Features Decisive Values”,257-259
  9. Rakesh M. Verma and Nirmala Rai. Phish-IDetector: Message-Id Based Automatic Phishing Detection, International Joint Conference on e-Business and Telecommunications 2015 .
  10. Basnet R., Mukkamala S., Sung A.H. (2008) Detection of Phishing Attacks: A Machine Learning Approach. In: Prasad B. (eds) Soft Computing Applications in Industry. Studies in Fuzziness and Soft Computing, vol 226. Springer, Berlin, Heidelberg
  11. Adwan Yasin and Adbelmunem, An intelligent classification model for phishing email detection , International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
  12. D. J. Hand, Heikki Mannila, Padhraic Smyth. Principles of Data Mining
  13. Ron Kohavi, A study of cross validation and bootstrap for accuracy estimation and model selection, International Joint Conference on Artificial Intelligence, 1995.


Phishing detection, SVM, ham, naive bayes, machine learning, email fraud, artificial intelligence