International Journal of Engineering Technology, Management and Applied Sciences www.ijetmas.com November 2015, Volume 3, Special Issue, ISSN 2349-4476 279 Sheetal Bairwa, Jyoti Gajrani and Vinesh Jain Augmentation of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing Dataset Sheetal Bairwa, Jyoti Gajrani and Vinesh Jain Department of Computer Science and Information Technology Government Engineering College, Ajmer, Rajasthan-305001 Abstract Data mining and machine learning concepts play a significant role while dealing with large number of datasets. Various algorithms embedded within these concepts provide a wide array of mechanisms to classify the data into its specific classes. No matter what algorithm is applied, it is certain that the applied algorithm should provide better results. Least square support vector machine (LS-SVM) is a machine learning approach used to classify the data. Although it works better in comparison to other algorithms, the various changes sustained on each run of the program execution in its parametric values makes it quite resilient enough towards its performance. Hence, this paper focuses on the enhancement of the performance level of traditional LS-SVM. In order to so, traditional LS-SVM is integrated together with simplified particle swarm optimization technique (PSO). PSO, a swarm intelligence based, optimization approach is exploited to optimize the kernel parametric values of LS-SVM so that it not only improves its classification performance but significantly also improve the time execution of the program being run. The proposed method is exploited on the phishing dataset and experimental results are evaluated against the results of other algorithms. Keyword: Phishing dataset, Machine learning, Least Square Support Vector Machine, Simple Particle Swarm Optimization, Schaffer function 1. Introduction Phishing is a malicious online fraud that tricks the user by sending them spoofed emails or making them visit a website that is not legitimate but pretends to be one. The benign user when clicks on the link or visits the website, he or she is required to fill in the form that is specifically designed to trap the user. The form includes providing information related to personal details such as credit card details, bank account information, etc. As soon, the user provides the information, it gets stored in the database of the phisher ( a phisher is one who perform phishing) from where the necessary information can be grabbed and then this information is used by the phisher making others to believe that he or she is a legitimate identity. Figure 1.1: Statistical survey of Phishing attacks