Profiling phishing email based on clustering approach


Autoria(s): Hamid, Isredza Rahmi A.; Abawajy, Jemal H.
Contribuinte(s)

[Unknown]

Data(s)

01/01/2013

Resumo

In this paper, an approach for profiling email-born phishing activities is proposed. Profiling phishing activities are useful in determining the activity of an individual or a particular group of phishers. By generating profiles, phishing activities can be well understood and observed. Typically, work in the area of phishing is intended at detection of phishing emails, whereas we concentrate on profiling the phishing email. We formulate the profiling problem as a clustering problem using the various features in the phishing emails as feature vectors. Further, we generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of these emails. The performance of the clustering algorithms at the earlier stage is crucial for the effectiveness of this model. We carried out an experimental evaluation to determine the performance of many classification algorithms by incorporating clustering approach in our model. Our proposed profiling email-born phishing algorithm (ProEP) demonstrates promising results with the RatioSize rules for selecting the optimal number of clusters.

Identificador

http://hdl.handle.net/10536/DRO/DU:30060748

Idioma(s)

eng

Publicador

IEEE Computer Society

Relação

http://dro.deakin.edu.au/eserv/DU:30060748/evid-trustcomconfpeerreviewgnrl-2013.pdf

http://dro.deakin.edu.au/eserv/DU:30060748/hamid-profilingphishing-2013.pdf

http://doi.org/10.1109/TrustCom.2013.76

Direitos

2013, IEEE

Palavras-Chave #profiling #phishing #clustering algorithm
Tipo

Conference Paper