Skip to main content

Combining RDR-Based Machine Learning Approach and Human Expert Knowledge for Phishing Prediction

  • Conference paper
  • First Online:
PRICAI 2016: Trends in Artificial Intelligence (PRICAI 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9810))

Included in the following conference series:

  • 2714 Accesses

Abstract

Detecting phishing websites has been noted as complex and dynamic problem area because of the subjective considerations and ambiguities of detection mechanism. We propose a novel approach that uses Ripple-down Rule (RDR) to acquire knowledge from human experts with the modified RDR model-generating algorithm (Induct RDR), which applies machine-learning approach. The modified algorithm considers two different data types (numeric and nominal) and also applies information theory from decision tree learning algorithms. Our experimental results showed the proposing approach can help to deduct the cost of solving over-generalization and over-fitting problems of machine learning approach. Three models were included in comparison: RDR with machine learning and human knowledge, RDR machine learning only and J48 machine learning only. The result shows the improvements in prediction accuracy of the knowledge acquired by machine learning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aburrous, M., Khelifi, A.: Phishing detection plug-in toolbar using intelligent Fuzzy-classification mining techniques. In: The International Conference on Soft Computing and Software Engineering [SCSE 2013]. San Francisco State University, San Francisco (2013)

    Google Scholar 

  2. Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986)

    Google Scholar 

  3. Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology (1990)

    Google Scholar 

  4. Dietterich, T.: Overfitting and undercomputing in machine learning. ACM Comput. Surv. (CSUR) 27(3), 326–327 (1995)

    Article  Google Scholar 

  5. Pham, H.N.A., Triantaphyllou, E.: The impact of overfitting and overgeneralization on the classification accuracy in data mining. In: Soft Computing for Knowledge Discovery and Data Mining, pp. 391–431. Springer (2008)

    Google Scholar 

  6. Compton, P., Jansen, R.: Knowledge in context: a strategy for expert system maintenance. In: Barter, C.J., Brooks, M.J. (eds.) AI 1988. LNCS, vol. 406, pp. 292–306. Springer, Heidelberg (1998)

    Google Scholar 

  7. Nguyen, D.Q., Nguyen, D.Q., Pham, S.B., Pham, D.D.: Ripple down rules for part-of-speech tagging. In: Gelbukh, A.F. (ed.) CICLing 2011, Part I. LNCS, vol. 6608, pp. 190–201. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Pham, S.B., Hoffmann, A.: A new approach for scientific citation classification using cue phrases. In: Gedeon, T(.D., Fung, L.C.C. (eds.) AI 2003. LNCS (LNAI), vol. 2903, pp. 759–771. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Mazid, M.M., Ali, S., Tickle, K.S.: Improved C4. 5 algorithm for rule based classification. In: Proceedings of the 9th WSEAS International Conference on Artificial intelligence, knowledge Engineering and Data Bases. World Scientific and Engineering Academy and Society (WSEAS) (2010)

    Google Scholar 

  10. Ruggieri, S.: Efficient C4. 5 [classification algorithm]. IEEE Trans. Knowl. Data Eng. 14(2), 438–444 (2002)

    Article  Google Scholar 

  11. Gaines, B.R.: An ounce of knowledge is worth a ton of data: quantitative studies of the trade-off between expertise and data based on statistically well-founded empirical induction. In: ML (1989)

    Google Scholar 

  12. Cendrowska, J.: PRISM: an algorithm for inducing modular rules. Int. J. Man Mach. Stud. 27(4), 349–370 (1987)

    Article  MATH  Google Scholar 

  13. Joshi, M.V., Kumar, V.: CREDOS: classification using ripple down structure (a case for rare classes). In: SDM. SIAM (2004)

    Google Scholar 

  14. Devasena, C.L., et al.: Effectiveness evaluation of rule based classifiers for the classification of iris data set. Bonfring Int. J. Man Mach. Interface 1, 5 (2011)

    Google Scholar 

  15. Mohammad, R.M., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443–458 (2014). Aug 1

    Article  Google Scholar 

  16. Han, S.C., Yoon, H.G., Kang, B.H., Park, S.B.: Using MCRDR based agile approach for expert system development. Computing 96(9), 897–908 (2014). Sep 1

    Article  Google Scholar 

  17. Han, S.C., Mirowski, L., Kang, B.H.: Exploring a role for MCRDR in enhancing telehealth diagnostics. Multimedia Tools Appl. 74(19), 8467–8481 (2015). Oct 1

    Article  Google Scholar 

Download references

Acknowledgement

This paper was supported by the grant FA2386-15-1-6061, funded by Asian Office of Aerospace Research and Development (AOARD), Japan. This work was supported by the Industrial Strategic Technology Development Program, 10052955, Experiential Knowledge Platform Development Research for the Acquisition and Utilization of Field Expert Knowledge, funded by the Ministry of Trade, Industry & Energy (MI, Korea).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Byeong Ho Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Chung, H., Chen, R., Han, S.C., Kang, B.H. (2016). Combining RDR-Based Machine Learning Approach and Human Expert Knowledge for Phishing Prediction. In: Booth, R., Zhang, ML. (eds) PRICAI 2016: Trends in Artificial Intelligence. PRICAI 2016. Lecture Notes in Computer Science(), vol 9810. Springer, Cham. https://doi.org/10.1007/978-3-319-42911-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42911-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42910-6

  • Online ISBN: 978-3-319-42911-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics