You are not logged in.

A competitive three-level pruning technique for information security

Chowdhury,M, Abawajy,J, Kelarev,A and Sakurai,K 2014, A competitive three-level pruning technique for information security. In Batten, L, Li, G, Niu, W and Warren, M (ed), Applications and Techniques in Information Security, Springer Verlag, Berlin, Germany, pp.25-32, doi: 10.1007/978-3-662-45670-5.

Attached Files
Name Description MIMEType Size Downloads

Title A competitive three-level pruning technique for information security
Author(s) Chowdhury,MORCID iD for Chowdhury,M orcid.org/0000-0002-2866-4955
Abawajy,J
Kelarev,A
Sakurai,K
Title of book Applications and Techniques in Information Security
Editor(s) Batten, L
Li, G
Niu, W
Warren, M
Publication date 2014
Series Communications in Computer and Information Science v.490
Chapter number 3
Total chapters 24
Start page 25
End page 32
Total pages 8
Publisher Springer Verlag
Place of Publication Berlin, Germany
Keyword(s) pruning techniques
ensemble classifiers
phishing
k-means
directed hill climbing
Summary The reduction of size of ensemble classifiers is important for various security applications. The majority of known pruning algorithms belong to the following three categories: ranking based, clustering based, and optimization based methods. The present paper introduces and investigates a new pruning technique. It is called a Three-Level Pruning Technique, TLPT, because it simultaneously combines all three approaches in three levels of the process. This paper investigates the TLPT method combining the state-of-the-art ranking of the Ensemble Pruning via Individual Contribution ordering, EPIC, the clustering of the K-Means Pruning, KMP, and the optimisation method of Directed Hill Climbing Ensemble Pruning, DHCEP, for a phishing dataset. Our new experiments presented in this paper show that the TLPT is competitive in comparison to EPIC, KMP and DHCEP, and can achieve better outcomes. These experimental results demonstrate the effectiveness of the TLPT technique in this example of information security application.
Notes 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings
ISBN 9783662456705
ISSN 1865-0929
Language eng
DOI 10.1007/978-3-662-45670-5
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890101 Fixed Line Data Networks and Services
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
Copyright notice ©2014, Springer Verlag
Persistent URL http://hdl.handle.net/10536/DRO/DU:30069145

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 215 Abstract Views, 12 File Downloads  -  Detailed Statistics
Created: Wed, 08 Apr 2015, 13:14:21 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.