This paper is published in Volume-9, Issue-6, 2024
Area
Computer Science
Author
Vusa Vamsi Krishna
Org/Univ
Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, India
Pub. Date
03 January, 2024
Paper ID
V9I6-1235
Publisher
Keywords
Phishing Mail Detection, Bidirectional LSTM, Recurrent Neural Network, Sequential Data, Detection Accuracy

Citationsacebook

IEEE
Vusa Vamsi Krishna. Phishing mail detection using bidirectional LSTM, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Vusa Vamsi Krishna (2024). Phishing mail detection using bidirectional LSTM. International Journal of Advance Research, Ideas and Innovations in Technology, 9(6) www.IJARIIT.com.

MLA
Vusa Vamsi Krishna. "Phishing mail detection using bidirectional LSTM." International Journal of Advance Research, Ideas and Innovations in Technology 9.6 (2024). www.IJARIIT.com.

Abstract

Phishing attacks have become a major concern in today's digital world, where malicious actors try to dupe unsuspecting individuals into divulging sensitive information. The need for effective methods to detect phishing emails has become crucial. In this study, we propose a novel approach for phishing mail detection using Bidirectional Long Short-Term Memory (BiLSTM) networks. BiLSTM networks are a type of recurrent neural network (RNN) that can capture temporal dependencies in sequential data. Our approach leverages the power of BiLSTM networks to analyze the content and structure of emails for identifying phishing attempts. We preprocess the email data by converting them into sequential tokenized representations. These representations are then fed into the BiLSTM network to learn the patterns and features associated with phishing emails. We train our model using a large dataset of labeled phishing and non-phishing emails. Experimental results demonstrate that our proposed approach achieves high detection accuracy, outperforming traditional machine learning algorithms. The ability of BiLSTM networks to capture both past and future contextual information allows our model to effectively identify phishing emails based on their content and structural properties. With the increasing sophistication of phishing attacks, the development of robust and accurate detection systems is paramount. Our approach contributes to this goal by providing an efficient and reliable method for detecting phishing emails, thereby enhancing the security of individuals and businesses