Author
Listed:
- Kittipol Wisaeng
- Benchalak Muangmeesri
Abstract
Phishing emails remain among the most widespread and insidious vectors for cyberattacks, leveraging social engineering tactics and psychological manipulation to deceive recipients and compromise information systems. This study examines the effectiveness of advanced deep learning architectures, including Feedforward Neural Networks (FNN), Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and Bidirectional Encoder Representations from Transformers (BERT), in the automated classification of phishing emails versus legitimate ones. Utilizing a large, feature-enriched dataset that integrates linguistic, structural, and behavioral attributes, the models were evaluated using comprehensive performance metrics, including Accuracy, Precision, Recall, F1 Score, Mean Squared Error (MSE), and Root Mean Squared Error (RMSE). Experimental findings indicate that BERT achieves superior performance, attaining a classification accuracy of 97% and the lowest error rates, which can be attributed to its ability to model deep semantic and contextual nuances within email content. Feature importance analysis further demonstrates the significance of attributes such as hyperlink count, urgency-inducing keywords, and orthographic anomalies as discriminative indicators of phishing attempts. These results affirm the critical value of deep contextual representation in combating sophisticated phishing strategies. The study positions BERT as a state-of-the-art benchmark for high-fidelity email threat detection. Future research will focus on adapting cross-lingual models, enhancing adversarial resilience, and integrating real-time detection capabilities into enterprise-level security infrastructures.
Suggested Citation
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aac:ijirss:v:8:y:2025:i:5:p:1853-1865:id:9302. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Natalie Jean (email available below). General contact details of provider: https://ijirss.com/index.php/ijirss/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.