Multi-tier phishing email classification with an impact of classifier rescheduling

Islam, Md. Rafiqul, Abawajy, Jemal and Warren, Matthew 2009, Multi-tier phishing email classification with an impact of classifier rescheduling, in ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, ISPAN, [Kaohsiung, Korea], pp. 789-793.

Attached Files
Name Description MIMEType Size Downloads

Title Multi-tier phishing email classification with an impact of classifier rescheduling
Author(s) Islam, Md. Rafiqul
Abawajy, Jemal
Warren, Matthew
Conference name Pervasive Systems, Algorithms and Networks. Symposium (10th : 2009 : Kaohsiung, Korea)
Conference location Kaohsiung, Korea
Conference dates 14-16 Dec. 2009
Title of proceedings ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks
Editor(s) [Unknown]
Publication date 2009
Conference series International Symposium on the Pervasive Systems, Algorithms and Networks
Start page 789
End page 793
Publisher ISPAN
Place of publication [Kaohsiung, Korea]
Keyword(s) Phishing
classifiers
multi-tier
analyser
Summary Protecting user's mailbox from infiltration of phishing email is a significant research issue now a day. Many researches are going on filtering phishing using classification based algorithms and achieve substantial performance. It has been studied and investigated with different classification algorithms and observed that the outputs of the classifiers vary from one another with same corpora. This paper presents the impact of classifier rescheduling of multi-tier classification of phishing email to observe the best scheduling in the classification process. In our method, the features of phishing email will be extracted and classified in a sequential fashion by using the multi-tier classification and the outputs will be sent to the decision fusion process. Empirical evidence proofs that the impact of rescheduling of classifiers among the tiers gives diverse outcomes in terms of accuracy as well as number of false positive instances.
ISBN 9781424454037
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 890299 Computer Software and Services not elsewhere classified
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2009, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30029122

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 9 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 361 Abstract Views, 6 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jun 2010, 14:49:38 EST by Leanne Swaneveld

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.