{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:08:32Z","timestamp":1776442112879,"version":"3.51.2"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:00:00Z","timestamp":1654128000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:00:00Z","timestamp":1654128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive data for individuals or groups. Financial data, credit reports, and other sensitive data are often sent via the Internet. Phishing is a fraudster's technique used to get sensitive data from users by seeming to come from trusted sources. The sender can persuade you to give secret data by misdirecting in a phished email. The main problem is email phishing attacks while sending and receiving the email. The attacker sends spam data using email and receives your data when you open and read the email. In recent years, it has been a big problem for everyone. This paper uses different legitimate and phishing data sizes, detects new emails, and uses different features and algorithms for classification. A modified dataset is created after measuring the existing approaches. We created a feature extracted comma-separated values (CSV) file and label file, applied the support vector machine (SVM), Naive Bayes (NB), and long short-term memory (LSTM) algorithm.\u00a0This experimentation considers the recognition of a phished email as a classification issue. According to the comparison and implementation, SVM, NB and LSTM performance is better and more accurate to detect email phishing attacks. The classification of email attacks using SVM, NB, and LSTM classifiers achieve the highest accuracy of 99.62%, 97% and 98%, respectively.<\/jats:p>","DOI":"10.1007\/s40747-022-00760-3","type":"journal-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T09:02:54Z","timestamp":1654160574000},"page":"3043-3070","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":99,"title":["Cloud-based email phishing attack using machine and deep learning algorithm"],"prefix":"10.1007","volume":"9","author":[{"given":"Umer Ahmed","family":"Butt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3143-689X","authenticated-orcid":false,"given":"Rashid","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Hamza","family":"Aldabbas","sequence":"additional","affiliation":[]},{"given":"Senthilkumar","family":"Mohan","sequence":"additional","affiliation":[]},{"given":"Bader","family":"Alouffi","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Ahmadian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,2]]},"reference":[{"key":"760_CR1","doi-asserted-by":"crossref","unstructured":"Radain D, et al. (2021) A review of defense mechanisms against distributed denial of service (DDoS) attacks on cloud computing. In: 2021 International Conference of Women in Data Science at Taif University (WiDSTaif).","DOI":"10.1109\/WiDSTaif52235.2021.9430220"},{"issue":"4","key":"760_CR2","first-page":"562","volume":"8","author":"F Ubaid","year":"2017","unstructured":"Ubaid F et al (2017) Mitigating address spoofing attacks in hybrid. SDN 8(4):562\u2013570","journal-title":"SDN"},{"key":"760_CR3","doi-asserted-by":"crossref","unstructured":"Stojnic T, Vatsalan D, Arachchilage N (2021) Phishing email strategies: understanding cybercriminals' strategies of crafting phishing emails. Security and Privacy","DOI":"10.1002\/spy2.165"},{"key":"760_CR4","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1109\/SURV.2013.030713.00020","volume":"15","author":"DA Almomani","year":"2013","unstructured":"Almomani DA et al (2013) A survey of phishing email filtering techniques. IEEE Commun Surv Tutor 15:2070\u20132090","journal-title":"IEEE Commun Surv Tutor"},{"key":"760_CR5","doi-asserted-by":"publisher","first-page":"168261","DOI":"10.1109\/ACCESS.2019.2954791","volume":"7","author":"A Karim","year":"2019","unstructured":"Karim A et al (2019) A comprehensive survey for intelligent spam email detection. IEEE Access 7:168261\u2013168295","journal-title":"IEEE Access"},{"key":"760_CR6","doi-asserted-by":"crossref","unstructured":"Peng T, Harris I, Sawa Y (2018) Detecting phishing attacks using natural language processing and machine learning. In: 2018 IEEE 12th International Conference on Semantic Computing (ICSC)","DOI":"10.1109\/ICSC.2018.00056"},{"key":"760_CR7","doi-asserted-by":"crossref","unstructured":"Niu W, et al. (2017) Phishing emails detection using CS-SVM. In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC)","DOI":"10.1109\/ISPA\/IUCC.2017.00160"},{"key":"760_CR8","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/TPC.2012.2208392","volume":"55","author":"J Wang","year":"2012","unstructured":"Wang J et al (2012) Research article phishing susceptibility: an investigation into the processing of a targeted spear phishing email. IEEE Trans Prof Commun 55:345\u2013362","journal-title":"IEEE Trans Prof Commun"},{"key":"760_CR9","doi-asserted-by":"crossref","unstructured":"Aldabbas H, Amin RJCC (2021) A novel mechanism to handle address spoofing attacks in SDN based it: 1\u201316","DOI":"10.1007\/s10586-021-03309-0"},{"key":"760_CR10","unstructured":"Mansoor RA, Jayasinghe ND, Muslam MM (2021) A comprehensive review on email spam classification using machine learning algorithms. In: 2021 International Conference on Information Networking (ICOIN)"},{"key":"760_CR11","doi-asserted-by":"crossref","unstructured":"Zhu E, et al. (2018) Effective phishing website detection based on improved bp neural network and dual feature evaluation. In: 2018 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Ubiquitous Computing and Communications, Big Data and Cloud Computing, Social Computing and Networking, Sustainable Computing and Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom)","DOI":"10.1109\/BDCloud.2018.00114"},{"key":"760_CR12","doi-asserted-by":"crossref","unstructured":"Garces I, Cazares M, Andrade R (2019) Detection of phishing attacks with machine learning techniques in cognitive security architecture: 366\u2013370.","DOI":"10.1109\/CSCI49370.2019.00071"},{"key":"760_CR13","doi-asserted-by":"crossref","unstructured":"Zekri M, et al. (2017) DDoS attacks detection using machine learning techniques in cloud computing environments: 1\u20137.","DOI":"10.1109\/CloudTech.2017.8284731"},{"key":"760_CR14","unstructured":"Touqeer H, et al. (2021) Smart home security: challenges, issues and solutions at different IoT layers: 1\u201337"},{"issue":"1","key":"760_CR15","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-020-00059-1","volume":"3","author":"MG Hr","year":"2020","unstructured":"Hr MG et al (2020) Development of anti-phishing browser based on random forest and rule of extraction framework. Cybersecurity 3(1):20","journal-title":"Cybersecurity"},{"key":"760_CR16","doi-asserted-by":"crossref","unstructured":"Korkmaz M, Sahingoz OK, Diary B (2020) Detection of Phishing Websites by Using Machine Learning-Based URL Analysis. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","DOI":"10.1109\/ICCCNT49239.2020.9225561"},{"key":"760_CR17","doi-asserted-by":"crossref","unstructured":"Azari A, et al. (2020) Imbalanced learning in massive phishing datasets. In: 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00032"},{"key":"760_CR18","doi-asserted-by":"crossref","unstructured":"S\u00f6nmez Y, et al. (2018) Phishing web sites feature classification based on an extreme learning machine. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS)","DOI":"10.1109\/ISDFS.2018.8355342"},{"key":"760_CR19","doi-asserted-by":"crossref","unstructured":"Tawalbeh L, et al. (2020) Predicting and preventing cyber attacks during COVID-19 time using data analysis and proposed secure iot layered model. In: 2020 Fourth International Conference on Multimedia Computing, Networking and Applications (MCNA)","DOI":"10.1109\/MCNA50957.2020.9264301"},{"key":"760_CR20","doi-asserted-by":"crossref","unstructured":"O\u00f1a D, et al. (2019) Phishing attacks: detecting and preventing infected emails using machine learning methods. In: 2019 3rd Cyber Security at Networking Conference (CSNet)","DOI":"10.1109\/CSNet47905.2019.9108961"},{"key":"760_CR21","unstructured":"Alam MSB (2017) Cloud computing\u2014architecture, platform and security issues: a survey. World Scientific News (WSN) 86."},{"key":"760_CR22","unstructured":"Alsolami E (2018) Security threats and legal issues related to Cloud based solutions. IJCSNS Int J Comput Sci Netw Secur 18."},{"key":"760_CR23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jnca.2016.05.010","volume":"71","author":"MA Khan","year":"2016","unstructured":"Khan MA (2016) A survey of security issues for cloud computing. J Netw Comput Appl 71:11\u201329","journal-title":"J Netw Comput Appl"},{"key":"760_CR24","unstructured":"Ilangakoon SD, Abeywardena KY (2018) The use of subliminal and supraliminal messages in phishing and spear phishing based social engineering attacks; feasibility study. In: 2018 13th International Conference on Computer Science and Education (ICCSE)"},{"key":"760_CR25","doi-asserted-by":"crossref","unstructured":"Biswal S (2021) Real-time intelligent vishing prediction and awareness model (RIVPAM). In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","DOI":"10.1109\/CyberSA52016.2021.9478240"},{"key":"760_CR26","unstructured":"Syiemlieh P, et al. (2015) Phishing\u2014an analysis of the types, causes, preventive measures and case studies in the current situation"},{"key":"760_CR27","first-page":"1","volume":"2019","author":"T Nathezhtha","year":"2019","unstructured":"Nathezhtha T, Sangeetha D, Vaidehi V (2019) WC-PAD: web crawling based phishing attack detection. Int Carnah Conf Secur Technol (ICCST) 2019:1\u20136","journal-title":"Int Carnah Conf Secur Technol (ICCST)"},{"key":"760_CR28","doi-asserted-by":"crossref","unstructured":"Saha I, et al (2020) Phishing attacks detection using deep learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp 1180\u20131185","DOI":"10.1109\/ICSSIT48917.2020.9214132"},{"key":"760_CR29","doi-asserted-by":"crossref","unstructured":"Li, W, Meng W (2015) An empirical study on email classification using supervised machine learning in real environments: 7438\u20137443","DOI":"10.1109\/ICC.2015.7249515"},{"key":"760_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102389","volume":"109","author":"M Ring","year":"2021","unstructured":"Ring M et al (2021) Malware detection on windows audit logs using LSTMs. Comput Secur 109:102389","journal-title":"Comput Secur"},{"key":"760_CR31","doi-asserted-by":"crossref","unstructured":"Shrivastava A, Dubey R (2018) Classification of Spam Mail using different machine learning algorithms. In: 2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","DOI":"10.1109\/ICACAT.2018.8933787"},{"key":"760_CR32","doi-asserted-by":"crossref","unstructured":"Wijaya A, Bisri A (2016) Hybrid decision tree and logistic regression classifier for email spam detection. In: 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE)","DOI":"10.1109\/ICITEED.2016.7863267"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00760-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00760-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00760-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T08:55:54Z","timestamp":1727340954000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00760-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,2]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["760"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00760-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,2]]},"assertion":[{"value":"5 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}