Consensus clustering and supervised classification for profiling phishing emails in internet commerce security

  • Authors:
  • Richard Dazeley;John L. Yearwood;Byeong H. Kang;Andrei V. Kelarev

  • Affiliations:
  • Centre for Informatics and Applied Optimization, Graduate School of ITMS, University of Ballarat, Ballarat, Victoria, Australia;Centre for Informatics and Applied Optimization, Graduate School of ITMS, University of Ballarat, Ballarat, Victoria, Australia;School of Computing and Information Systems, University of Tasmania, Hobart, Tasmania, Australia;Centre for Informatics and Applied Optimization, Graduate School of ITMS, University of Ballarat, Ballarat, Victoria, Australia

  • Venue:
  • PKAW'10 Proceedings of the 11th international conference on Knowledge management and acquisition for smart systems and services
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

This article investigates internet commerce security applications of a novel combined method, which uses unsupervised consensus clustering algorithms in combination with supervised classification methods. First, a variety of independent clustering algorithms are applied to a randomized sample of data. Second, several consensus functions and sophisticated algorithms are used to combine these independent clusterings into one final consensus clustering. Third, the consensus clustering of the randomized sample is used as a training set to train several fast supervised classification algorithms. Finally, these fast classification algorithms are used to classify the whole large data set. One of the advantages of this approach is in its ability to facilitate the inclusion of contributions from domain experts in order to adjust the training set created by consensus clustering. We apply this approach to profiling phishing emails selected from a very large data set supplied by the industry partners of the Centre for Informatics and Applied Optimization. Our experiments compare the performance of several classification algorithms incorporated in this scheme.