Comparative Analysis of Machine Learning Algorithms for the Detection and Classification of Suspicious Emails
- Authors
-
-
Shamsuddeen J. AHMAD
Department of Computer Science, Kaduna polytechnic, Kaduna, Nigeria
Author
-
Saifullahi S. SADI
Department of Cyber Security, Nigerian Defence Academy, Kaduna, Nigeria
Author
-
Muhammad M. AHMAD
Department of Secure Computing, Kaduna State University, Zaria, Kaduna State, Nigeria
Author
-
Abdullahi D. UMAR
Department of Secure Computing, Kaduna State University, Zaria, Kaduna State, Nigeria
Author
-
Shamsuddeen USMAN
Department of Computer Science, Nuhu Bamalli Polytechnic, Zaria, Kaduna State, Nigeria
Author
-
- Keywords:
- Machine Learning, Random Forest, Support Vector Machine, Artificial Neural Network, Artificial Intelligence, Term Frequency-Inverse Document Frequency.
- Abstract
-
The exponential growth of corporate email communications poses significant challenges for digital forensic investigations because manual analysis is slow, resource-intensive, and error-prone. This study compares three machine learning algorithms: Random Forest, Support Vector Machine (SVM), and Artificial Neural Network (ANN) for the detection and classification of suspicious emails. A publicly available dataset from the GitHub repository that comprises 60,000 instances was extracted. The methodology involved preprocessing the dataset by encoding categorical features and converting email body content into numerical representations using TF-IDF vectorisation, and SMOTE was used to balance the dataset. The dataset was then split into 80% (48,000 instances) for training and 20% (12,000 instances) for testing, and each classifier was trained and evaluated using performance metrics including accuracy, precision, recall, F1-score, and AUC. The result indicates that ANN achieved the highest performance (accuracy: 99.86%, AUC: 1.00), with balanced precision and recall across “Evidence” and “Non-Evidence” classes. Random Forest also performed strongly (accuracy: 99.92%, AUC: 1.00) with high interpretability, while SVM (accuracy: 98.92%, AUC: 1.00) showed strong precision but lower recall for “Non-Evidence” emails. ANN’s superior performance is attributed to its ability to model complex patterns and handle class imbalance effectively. The findings indicate that ANN demonstrates the highest performance in classifying suspicious emails, showing superior accuracy, efficiency, and scalability.
- References
- Downloads
- Published
- 24-11-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Emma S. EKPO, Mokọ́ládé JOHNSON, Constructing Meaning and Enhancing Well-Being: The Role of Place Attachment, Place Identity, and Sense of Place in Architectural Studio Environments , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Samuel E. CHUKWU, Martins Y. OTACHE, Precious O. ATEMOAGBO, Emmanuel O. AGBESE, Copula-Based Modelling of Drought Severity-Duration-Frequency Relationship of Sokoto-Rima-River Basin, Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Mohammed U. GARBA, Usman B. ABDULLAHI, Hayatudden S. BARAYAIS, Aisha B. FARUQ, Suleiman IDRIS, Abubakar M. MUHAMMAD, Abubakar S. MOHAMMED, Treatment of Gold Mining Wastewater: A Review of Current Technologies and Future Perspectives , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olarewaju T. OGINNI, An Overview of Unmanned Aerial Vehicles Technologies for Office Use and Services Delivery , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Tolulope S. FAWALE, Monday O. IMAFIDON, Chukwuemeka P. OGBU, Adoption of Non-Financial Motivational Strategies for Enhancing Productivity on Construction Sites in Edo State, Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Muazu D. ZAKARI, Md R. KAMAL, Wada I. MUHAMMAD, Nuraddeen M. NASIDI, Dahiru MOHAMMED, Agro-Hydrological Modelling Systems in Peninsula Malaysia: A Comprehensive Review and a Guide towards Model Development , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Munir A. ADEWOYE, Ahmed ALIYU, Usman A. ALI, Abdulrasheed JIMOH, Blockchain-Based Food Supply Chain Traceability: A Systematic Review of Privacy Preserving and Scalability , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Emmanuel O. AGBENYI, Adefope OWOJORI, Oluwadare J. AKINDUGBAGBE, Babatunde ADEBO, Chigbo I. OKEREKE, Impact Assessment of Natural Radionuclides in Cassava Tubbers Harvested from a Farmlands Around Quarry in Moniya Ibadan, Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
