Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation
release_qbte7pmz6rhhrlstkouw3layni
by
Rawaa Mohammed Abdul-Hussein,
Ahmed H. Mohammed,
Amal Abbas Kadhim
2022 p543-551
Abstract
Cyber-criminal attacks witnessed various phishing attacks that blindly attract users to use their secret personal information. This research highlights this type of attack and proposes the development of a new model to detect phishing websites. Two aspects of improvement were followed. Firstly, a new feature is inferred from a combination of features with higher classification capability than the original features. Secondly, a novel method has been proposed by using differential evaluation (DE) to select the best rules among the fuzzy rule set; the DE is a viable way to optimize the fuzzy rule, improving the classification complexity. The proposed system was evaluated by applying two malicious and legitimate datasets collected from Phishtank and Alexa websites. Results show the combination feature can include a promising method for detecting phishing attacks according to the evaluation metrics in the precision of 0.973, recall of 0.933, F-measure of 0.947, and accuracy of 0.976.
In application/xml+jats
format
Archived Files and Locations
application/pdf
428.5 kB
file_hzqunddkjrdhfhw67wpcmvpjky
|
www.temjournal.com (web) web.archive.org (webarchive) |
access all versions, variants, and formats of this works (eg, pre-prints)
Crossref Metadata (via API)
Worldcat
SHERPA/RoMEO (journal policies)
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar