Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abdillah, Rahmad | - |
dc.contributor.author | Shukur, Zarina | - |
dc.contributor.author | Mohd, Masnizah | - |
dc.contributor.author | Murah, TS. Mohd Zamri | - |
dc.contributor.author | Yim, Kangbin | - |
dc.contributor.author | Oh, Insu | - |
dc.date.accessioned | 2023-03-09T08:40:54Z | - |
dc.date.available | 2023-03-09T08:40:54Z | - |
dc.date.issued | 2022-01 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/22202 | - |
dc.description.abstract | Phishing attacks have become a perilous threat in recent years, which has led to numerous studies to determine the classification technique that best detects these attacks. Several studies have made comparisons using only specific datasets and techniques without including the most crucial aspect, which is the performance evaluation of data changes. Hence, classification techniques cannot be generalized if they only use specific datasets and techniques. Therefore, this research determined the performance of classification techniques on changing data through a subset of schemes in a dataset. It was conducted using unbalanced and balanced phishing datasets, as well as subset schemes in ratios of 90:10, 80:20, 70:30, and 60:40. The thirteen most recent classification techniques used in preliminary phishing studies were compared and evaluated against ten performance measures. The results showed that the proposed schemes successfully uncover the maximum and minimum performance obtained by a classification technique. These comparisons can provide deeper insights into phishing classification techniques than related research. | - |
dc.format.extent | 18 | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2022.3225971 | - |
dc.identifier.scopusid | 2-s2.0-85144020990 | - |
dc.identifier.wosid | 000979904900001 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.11, pp 38721 - 38738 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 11 | - |
dc.citation.startPage | 38721 | - |
dc.citation.endPage | 38738 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Phishing | - |
dc.subject.keywordAuthor | Performance evaluation | - |
dc.subject.keywordAuthor | Random forests | - |
dc.subject.keywordAuthor | Feature extraction | - |
dc.subject.keywordAuthor | Support vector machines | - |
dc.subject.keywordAuthor | Uniform resource locators | - |
dc.subject.keywordAuthor | Benchmark testing | - |
dc.subject.keywordAuthor | classification algorithms | - |
dc.subject.keywordAuthor | performance evaluation | - |
dc.subject.keywordAuthor | phishing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.