Decision Tree Algorithm
Decision Tree Algorithm
ALGORITHM
Guided By Presented By
Mrs Vani V Prakash Anoop N M
Assistant Professor S7 CSE
Dept of CSE CMA20CS011
Contents
1. Introduction
2. Phishing
3. Decision Tree
4. How Decision Trees can be used to detect phishing attacks
5. Architecture of Decision Tree
6. Features of Decision Tree
7. Advantages and disadvantages of Decision Tree
8. How the algorithm works
9. Conclusion
10. References
Introduction
Phishing attacks are a type of social engineering attack that attempts to trick
users into revealing sensitive information, such as passwords, credit card
numbers, or other personal details. These attacks can be carried out through a
variety of channels, including email, SMS, social media, and websites
Decision Tree
● Decision trees are a popular machine learning model known for their
simplicity and interpretability.
● Decision trees are graphical, easy to interpret, and can be easily explained
to non-experts
Advantages
❖ Interpretability
Decision trees are easy to understand and interpret, making it simple for
security professionals and analysts to grasp the logic behind the decision-
making process
❖ Feature Importance
Decision trees can provide insights into the importance of different
features in making a decision. Features such as URL structure, domain
age, and presence of HTTPS can be weighed in terms of their significance
in determining whether a website is potentially malicious.
Contd…
❖ Efficiency
Decision trees can be efficient in terms of both training and
prediction times.
They are relatively quick to build, and once trained, the decision-
making process involves traversing the tree structure, which is
computationally efficient.
❖ Robustness
Decision trees are robust to irrelevant features, meaning that the
algorithm can still perform well even if some of the input features are
not particularly informative.
Disadvantages
❖ Overfitting
Decision trees are prone to overfitting, especially when the tree is deep and
captures noise or specific details of the training data that do not generalize
well to new, unseen data.
❖ Instability
Decision trees can be sensitive to small variations in the training data. A
small change in the input data can lead to a completely different tree
structure, making the model less stable compared to some other machine
learning algorithms.
Contd…
Regarding the accuracy of the Decision Tree Algorithm for phishing detection,
the paper mentioned that the algorithm achieved a detection accuracy of 96.59%
using the Decision Tree Algorithm with the lowest false positive rate.
Conclusion
The Decision Tree algorithm serves as an essential asset in the proactive defense
against phishing attacks. Its simplicity, interpretability, and ability to handle both
numerical and categorical data make it a noteworthy choice for those seeking a
comprehensive and understandable solution in the ongoing battle to secure
digital environments.
References