Review of the machine learning methods in the classification of phishing attack

John Arthur Jupin, Tole Sutikno, Mohd Arfian Ismail, Mohd Saberi Mohamad, Shahreen Kasim, Deris Stiawan

Research output: Contribution to journalReview articlepeer-review

25 Citations (Scopus)


The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.

Original languageEnglish
Pages (from-to)1545-1555
Number of pages11
JournalBulletin of Electrical Engineering and Informatics
Issue number4
Publication statusPublished - Dec 2019
Externally publishedYes


  • Classification
  • Machine learning
  • Phishing

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Control and Systems Engineering
  • Information Systems
  • Instrumentation
  • Hardware and Architecture
  • Computer Networks and Communications
  • Control and Optimization
  • Electrical and Electronic Engineering


Dive into the research topics of 'Review of the machine learning methods in the classification of phishing attack'. Together they form a unique fingerprint.

Cite this