{"title":"Detection of Phishing Webpages Using Heterogeneous Transfer Learning","authors":"Karl R. Weiss, T. Khoshgoftaar","doi":"10.1109/CIC.2017.00034","DOIUrl":null,"url":null,"abstract":"The detection of phishing websites using traditional machine learning methods has been demonstrated in previous studies. Traditional machine learning methods assume that the input feature space is the same between the training and testing data. There are scenarios in machine learning, where the available labeled training data has a different input feature space than the testing data. In cases where the input feature space between the testing and training data are different, traditional machine learning methods cannot be used. Heterogeneous transfer learning methods are used to transform the different input feature spaces between the testing and the training data into a unique and common set of input features. For our experiment, we construct numerous scenarios for the application of phishing website detection, where the features of the testing and training data are different. Our experiment starts with a baseline dataset for the detection of phishing websites. This baseline dataset is used to create separate training and testing datasets by splitting the features, such that the features in the training and testing data are mutually exclusive. Then, a heterogeneous transfer learning technique called Canonical Correlation Analysis is used to align the input feature space between the training and testing data. The feature aligned training and testing data is used with various traditional machine learning methods and homogeneous transfer learning methods to predict phishing websites. The performance results of the different scenarios and algorithms are reported and analyzed.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"789 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIC.2017.00034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The detection of phishing websites using traditional machine learning methods has been demonstrated in previous studies. Traditional machine learning methods assume that the input feature space is the same between the training and testing data. There are scenarios in machine learning, where the available labeled training data has a different input feature space than the testing data. In cases where the input feature space between the testing and training data are different, traditional machine learning methods cannot be used. Heterogeneous transfer learning methods are used to transform the different input feature spaces between the testing and the training data into a unique and common set of input features. For our experiment, we construct numerous scenarios for the application of phishing website detection, where the features of the testing and training data are different. Our experiment starts with a baseline dataset for the detection of phishing websites. This baseline dataset is used to create separate training and testing datasets by splitting the features, such that the features in the training and testing data are mutually exclusive. Then, a heterogeneous transfer learning technique called Canonical Correlation Analysis is used to align the input feature space between the training and testing data. The feature aligned training and testing data is used with various traditional machine learning methods and homogeneous transfer learning methods to predict phishing websites. The performance results of the different scenarios and algorithms are reported and analyzed.