An application of novel clustering technique for information security


Autoria(s): Beliakov, Gleb; Yearwood, John; Kelarev, Andrei
Contribuinte(s)

Warren, Matthew

Data(s)

01/01/2011

Resumo

This article presents experimental results devoted to a new application of the novel clustering technique introduced by the authors recently. Our aim is to facilitate the application of robust and stable consensus functions in information security, where it is often necessary to process large data sets and monitor outcomes in real time, as it is required, for example, for intrusion detection. Here we concentrate on the particular case of application to profiling of phishing websites. First, we apply several independent clustering algorithms to a randomized sample of data to obtain independent initial clusterings. Silhouette index is used to determine the number of clusters. Second, we use a consensus function to combine these independent clusterings into one consensus clustering . Feature ranking is used to select a subset of features for the consensus function. Third, we train fast supervised classification algorithms on the resulting consensus clustering in order to enable them to process the whole large data set as well as new data. The precision and recall of classifiers at the final stage of this scheme are critical for effectiveness of the whole procedure. We investigated various combinations of three consensus functions, Cluster-Based Graph Formulation (CBGF), Hybrid Bipartite Graph Formulation (HBGF), and Instance-Based Graph Formulation (IBGF) and a variety of supervised classification algorithms. The best precision and recall have been obtained by the combination of the HBGF consensus function and the SMO classifier with the polynomial kernel.<br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30044865

Idioma(s)

eng

Publicador

School of Information Systems, Deakin University

Relação

http://dro.deakin.edu.au/eserv/DU:30044865/beliakov-applicationofnovel-2011.pdf

http://dro.deakin.edu.au/eserv/DU:30044865/beliakov-applicationofnovel-evidence-2011.pdf

http://dro.deakin.edu.au/eserv/DU:30044865/beliakov-atisconference-2011.pdf

http://www.deakin.edu.au/scitech/it/cyberspace-security/index.php

Direitos

2011, Deakin University

Palavras-Chave #consensus functions #clustering #classification #phishing websites
Tipo

Conference Paper