Research Article
Classification of Phishing Email Using Random Forest Machine Learning Technique
Begin RF Algorithm | Input: : number of nodes | : number of features | : number of trees to be constructed | Output: : the class with the highest vote | While stopping criteria is false do | Randomly draw a bootstrap sample A from the training data | Use the steps below to construct tree from the drawn bootstrapped sample A: | (I) Randomly select features from ; where ≪ | (II) For node d, calculate the best split point among the features | (III) Split the node into two daughter nodes using the best split | (IV) Repeat I, II and III until number of nodes has been reached | Build your forest by repeating steps I–IV for number of times | End While | Output all the constructed trees | Apply a new sample to each of the constructed trees starting from the root node | Assign the sample to the class corresponding to the leaf node. | Combine the decisions (or votes) of all the trees | Output , that is, the class with the highest vote. | End RF Algorithm |
|