Vol.11, No.2, May 2022. ISSN: 2217-8309 eISSN: 2217-8333
TEM Journal
TECHNOLOGY, EDUCATION, MANAGEMENT, INFORMATICS Association for Information Communication Technology Education and Science |
Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation
Rawaa Mohammed Abdul-Hussein, Ahmed H. Mohammed, Amal Abbas Kadhim
© 2022 Ahmed H. Mohammed, published by UIKTEN. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)
Citation Information: TEM Journal. Volume 11, Issue 2, Pages 543-551, ISSN 2217-8309, DOI: 10.18421/TEM112-07, May 2022.
Received: 22 January 2022. Revised: 29 March 2022.
Abstract:
Cyber-criminal attacks witnessed various phishing attacks that blindly attract users to use their secret personal information. This research highlights this type of attack and proposes the development of a new model to detect phishing websites. Two aspects of improvement were followed. Firstly, a new feature is inferred from a combination of features with higher classification capability than the original features. Secondly, a novel method has been proposed by using differential evaluation (DE) to select the best rules among the fuzzy rule set; the DE is a viable way to optimize the fuzzy rule, improving the classification complexity. The proposed system was evaluated by applying two malicious and legitimate datasets collected from Phishtank and Alexa websites. Results show the combination feature can include a promising method for detecting phishing attacks according to the evaluation metrics in the precision of 0.973, recall of 0.933, F-measure of 0.947, and accuracy of 0.976.
Keywords –phishing, cyber-attack, fuzzy rule, differential evaluation. |
----------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------- |