Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation release_qbte7pmz6rhhrlstkouw3layni

by Rawaa Mohammed Abdul-Hussein, Ahmed H. Mohammed, Amal Abbas Kadhim

Published in TEM Journal by Association for Information Communication Technology Education and Science (UIKTEN).

2022   p543-551

Abstract

Cyber-criminal attacks witnessed various phishing attacks that blindly attract users to use their secret personal information. This research highlights this type of attack and proposes the development of a new model to detect phishing websites. Two aspects of improvement were followed. Firstly, a new feature is inferred from a combination of features with higher classification capability than the original features. Secondly, a novel method has been proposed by using differential evaluation (DE) to select the best rules among the fuzzy rule set; the DE is a viable way to optimize the fuzzy rule, improving the classification complexity. The proposed system was evaluated by applying two malicious and legitimate datasets collected from Phishtank and Alexa websites. Results show the combination feature can include a promising method for detecting phishing attacks according to the evaluation metrics in the precision of 0.973, recall of 0.933, F-measure of 0.947, and accuracy of 0.976.
In application/xml+jats format

Archived Files and Locations

application/pdf   428.5 kB
file_hzqunddkjrdhfhw67wpcmvpjky
www.temjournal.com (web)
web.archive.org (webarchive)
Read Archived PDF
Preserved and Accessible
Type  article-journal
Stage   published
Date   2022-05-27
Language   en ?
Container Metadata
Open Access Publication
In DOAJ
In Keepers Registry
ISSN-L:  2217-8309
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 326a03f0-dcb2-45d2-8443-abf1a6448df6
API URL: JSON