Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Applying Clustering and Ensemble Clustering Approaches to phishing Profiling

Yearwood, J., Webb, D., Ma, Li, Vamplew, P., Ofoghi, B. and Kelarev, A.

    Each clustering is motivated by a natural representation of the emails. A data set of 2048 phishing emails provided by a major Australian financial institution was pre-processed to extract features describing the textual content, hyperlinks and orthographic structure of the emails. Independent clusterings using different techniques were performed on each representation, and these clusterings were then ensembled using a variety of consensus functions. This paper concentrates on using several clustering approaches to determine the most likely number of phishing groups and explores ways in which individual and combined results relate. The approach suggests a number of phishing groups and the structure of the approach can aid the development of profiles based on the individual clusters. The actual profiling is not carried out in this paper.
Cite as: Yearwood, J., Webb, D., Ma, Li, Vamplew, P., Ofoghi, B. and Kelarev, A. (2009). Applying Clustering and Ensemble Clustering Approaches to phishing Profiling. In Proc. Australasian Data Mining Conference (AusDM'09) Melbourne, Australia. CRPIT, 101. Kennedy P. J., Ong K. and Christen P. Eds., ACS. 25-34
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS