DocumentCode :
652223
Title :
Profiling Phishing Email Based on Clustering Approach
Author :
Hamid, Isredza Rahmi A. ; Abawajy, Jemal H.
Author_Institution :
Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
628
Lastpage :
635
Abstract :
In this paper, an approach for profiling email-born phishing activities is proposed. Profiling phishing activities are useful in determining the activity of an individual or a particular group of phishers. By generating profiles, phishing activities can be well understood and observed. Typically, work in the area of phishing is intended at detection of phishing emails, whereas we concentrate on profiling the phishing email. We formulate the profiling problem as a clustering problem using the various features in the phishing emails as feature vectors. Further, we generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of these emails. The performance of the clustering algorithms at the earlier stage is crucial for the effectiveness of this model. We carried out an experimental evaluation to determine the performance of many classification algorithms by incorporating clustering approach in our model. Our proposed profiling email-born phishing algorithm (ProEP) demonstrates promising results with the RatioSize rules for selecting the optimal number of clusters.
Keywords :
electronic mail; pattern classification; pattern clustering; program diagnostics; unsolicited e-mail; ProEP algorithm; RatioSize rules; classification algorithms; clustering approach; clustering predictions; e-mail-born phishing activity profiling; feature vectors; optimal cluster number selection; performance evaluation; phishing email detection; profiling e-mail-born phishing algorithm; Classification algorithms; Clustering algorithms; Computational modeling; Data models; Electronic mail; Feature extraction; Prediction algorithms; Clustering Algorithm; Phishing; Profiling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.76
Filename :
6680895
Link To Document :
بازگشت