Deakin University
Browse

File(s) under permanent embargo

Performance evaluation of multi-tier ensemble classifiers for phishing websites

conference contribution
posted on 2012-01-01, 00:00 authored by Jemal AbawajyJemal Abawajy, Gleb BeliakovGleb Beliakov, Andrei Kelarev, J Yearwood
This article is devoted to large multi-tier ensemble classifiers generated as ensembles of ensembles and applied to phishing websites. Our new ensemble construction is a special case of the general and productive multi-tier approach well known in information security. Many efficient multi-tier classifiers have been considered in the literature. Our new contribution is in generating new large systems as ensembles of ensembles by linking a top-tier ensemble to another middletier ensemble instead of a base classifier so that the top~ tier ensemble can generate the whole system. This automatic generation capability includes many large ensemble classifiers in two tiers simultaneously and automatically combines them into one hierarchical unified system so that one ensemble is an integral part of another one. This new construction makes it easy to set up and run such large systems. The present article concentrates on the investigation of performance of these new multi~tier ensembles for the example of detection of phishing websites. We carried out systematic experiments evaluating several essential ensemble techniques as well as more recent approaches and studying their performance as parts of multi~level ensembles with three tiers. The results presented here demonstrate that new three-tier ensemble classifiers performed better than the base classifiers and standard ensembles included in the system. This example of application to the classification of phishing websites shows that the new method of combining diverse ensemble techniques into a unified hierarchical three-tier ensemble can be applied to increase the performance of classifiers in situations where data can be processed on a large computer.

History

Event

Applications and Technologies in Information Security. Workshop (3rd : 2012 : Melbourne, Vic.)

Pagination

11 - 16

Publisher

School of Information Systems, Deakin University

Location

Melbourne, Vic.

Place of publication

Melbourne, Vic.

Start date

2012-11-07

ISBN-13

9780987229823

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2012, Deakin University

Editor/Contributor(s)

M Warren

Title of proceedings

ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC