We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Link Based Cluster Ensemble Framework - Clustering Categorical Data for Internet Security Applications

Published on August 2013 by S. Sugantha, C. Ramasamy
International Conference on Systems Engineering And Modeling
Foundation of Computer Science USA
ICSEM - Number 1
August 2013
Authors: S. Sugantha, C. Ramasamy
22500f2f-a64f-4cde-9bf4-01e997423320

S. Sugantha, C. Ramasamy . Link Based Cluster Ensemble Framework - Clustering Categorical Data for Internet Security Applications. International Conference on Systems Engineering And Modeling. ICSEM, 1 (August 2013), 24-28.

@article{
author = { S. Sugantha, C. Ramasamy },
title = { Link Based Cluster Ensemble Framework - Clustering Categorical Data for Internet Security Applications },
journal = { International Conference on Systems Engineering And Modeling },
issue_date = { August 2013 },
volume = { ICSEM },
number = { 1 },
month = { August },
year = { 2013 },
issn = 0975-8887,
pages = { 24-28 },
numpages = 5,
url = { /proceedings/icsem/number1/13060-1312/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Systems Engineering And Modeling
%A S. Sugantha
%A C. Ramasamy
%T Link Based Cluster Ensemble Framework - Clustering Categorical Data for Internet Security Applications
%J International Conference on Systems Engineering And Modeling
%@ 0975-8887
%V ICSEM
%N 1
%P 24-28
%D 2013
%I International Journal of Computer Applications
Abstract

In recent years, an increasing number of security threats have brought serious risks to the internet. Internet security is needed for providing protection from internet related threats whose are threatening the availability of the internet, and the privacy of its users. One best solution for providing internet security is to use antivirus software product and it uses signature based detection method. Malware attacks and phishing websites (fake websites) are two major security threats. So we need an efficient method for automatically categorizing those threats for signature based detection . In this paper we propose a categorization system for profiling signatures to improve the anomaly detection process more efficiently. A categorization system that uses a link based cluster ensemble for automatically categorizing security threats. Cluster ensemble aggregates different clustering algorithms producing different solutions for grouping malware samples and phishing websites.

References
  1. S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "A comparison of machine learning techniques for phishing detection," in Proc. APWG eCrime Res. Summit, 2007.
  2. J. Azimi and X. Fern, "Adaptive cluster ensemble selection," in Proc. 21s Int. Joint Conf. Artif. Intell. San Francisco, CA, 2009.
  3. M. Bailey, J. Oberheide, J Andersen, Z. M. Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," in Recent Advances in Intrusion Detection, (Lecture Notes in Computer Science vol. 4637). New York: Springer, 2007.
  4. S. Basu, I. Davidson, and K. L. Wagstaff, Eds. , "Constrained Clustering: Advances in algorithms, Theory, and Applications," Boca Raton, FL: CRC Press, 2008.
  5. U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, "Scalable, behavior-based malware clustering," in Proc. 16th Annu. Netw. Distributed Secur. Symp. , 2009.
  6. C. Herley and D. Florencio, "A profitless endeavor: Phishing as tragedy of the commons," in Proc. New Secur. Paradigms Workshop, 2008.
  7. N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. C. Mitchell, "Clientside defense against web-based identity theft," in Proc. 11th Annu. Network Distrib. Syst. Secur. Symp. , 2004.
  8. Strehl? and J. Ghosh, "Cluster ensembles—A knowledge reuse framework for combining multiple partitions," J. Mach. Learn. Res. , vol. 3, Mar. 2003.
  9. Y. Ye, T. Li, Y. Chen, and Q. Jiang, "Automatic malware categorization using cluster ensemble," in Proc. 16th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2010.
  10. Natthakan Iam-On, Tossapon Boongoen, Simon Garrett, and Chris Price ," A Link Based Cluster Ensemble Approach for Categorical Data Clustering," vol. 24, no. 3, march 2012.
  11. Rui Xu and DonaldWunsch. " Survey of clustering algorithms,"IEEE transactions on neural networks, 16, May 2005.
  12. Y. Zhang, A. Fu, C. Cai, and P. Heng,"Clustering Categorical Data," Proc. Int'l Conf. Data Eng. (ICDE), 2000.
  13. G. Liu, B. Qiu, and L. Wenyin, "Automatic detection of phishing target from phishing webpage", in Proc. 20th Int. Conf. Pattern Recognit. , 2010.
  14. R. Dazeley, J. L. Yearwood, B. H. Kang, and A. V. Kelarev, "Consensus clustering and supervised classification for profiling phishing emails in internet commerce security," in Knowledge Management and Acquisition for Smart Systems and Service, New York, Springer-Verlag, 2010.
  15. Alexander Y. Liu and Dung N. Lam, "Using Consensus Clustering for Multi-view Anomaly Detection," 2012.
  16. Joshua S. White, Jeanna N. Matthews and John L. Stacy "A Method for the Automated Detection of Phishing Websites through both Site Characteristics and Image Analysis", 2012.
  17. Maher Aburrous, M. A. Hossain, Keshav Dahal, Fadi Thabtah, "Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies, "Information Technology: New Generations, Third International Conference on, pp. 176-181, 2010 Seventh International Conference on Information Technology, 2010.
  18. G. Liu, B. Qiu, and L. Wenyin, "Automatic detection of phishing target from phishing webpage", in Proc. 20th Int. Conf. Pattern Recognit. , 2010.
  19. R. Layton and P. Watters, "Determining provenance in phishing websites using automated conceptual analysis", in Proc. eCrime Res. Summit, 2009.
  20. R. Xu and D. Wunsch, "Survey of clustering algorithms," IEEE Trans. Neural Netw. , vol. 16, no. 3, May 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Hybrid Hierarchical Clustering Algorithm (hhca) Link Based Cluster Ensemble (lbce) Malware Categorization Phishing Websites Weighted K -medoids Algorithm (wkma)