Vol.11, No.2, May 2022.                                                                                                                                                                                   ISSN: 2217-8309

                                                                                                                                                                                                                        eISSN: 2217-8333

 

TEM Journal

 

TECHNOLOGY, EDUCATION, MANAGEMENT, INFORMATICS

Association for Information Communication Technology Education and Science


Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation

 

Rawaa Mohammed Abdul-Hussein, Ahmed H. Mohammed, Amal Abbas Kadhim

 

© 2022 Ahmed H. Mohammed, published by UIKTEN. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)

 

Citation Information: TEM Journal. Volume 11, Issue 2, Pages 543-551, ISSN 2217-8309, DOI: 10.18421/TEM112-07, May 2022.

 

Received: 22 January 2022.

Revised:   29 March 2022.
Accepted: 05 April 2022.
Published: 27 May 2022.

 

Abstract:

 

Cyber-criminal attacks witnessed various phishing attacks that blindly attract users to use their secret personal information. This research highlights this type of attack and proposes the development of a new model to detect phishing websites. Two aspects of improvement were followed. Firstly, a new feature is inferred from a combination of features with higher classification capability than the original features. Secondly, a novel method has been proposed by using differential evaluation (DE) to select the best rules among the fuzzy rule set; the DE is a viable way to optimize the fuzzy rule, improving the classification complexity. The proposed system was evaluated by applying two malicious and legitimate datasets collected from Phishtank and Alexa websites. Results show the combination feature can include a promising method for detecting phishing attacks according to the evaluation metrics in the precision of 0.973, recall of 0.933, F-measure of 0.947, and accuracy of 0.976.

 

Keywords –phishing, cyber-attack, fuzzy rule, differential evaluation.

 

-----------------------------------------------------------------------------------------------------------

Full text PDF >  

-----------------------------------------------------------------------------------------------------------

 


Copyright © 2022 UIKTEN
Copyright licence: All articles are licenced via Creative Commons CC BY-NC-ND 4.0 licence