A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection

Noor Syahirah Nordin, Mohd Arfian Ismail, Tole Sutikno, Shahreen Kasim, Rohayanti Hassan, Zalmiyah Zakaria, Mohd Saberi Mohamad

Research output: Contribution to journalReview articlepeer-review

8 Citations (Scopus)

Abstract

Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure.

Original languageEnglish
Pages (from-to)1146-1158
Number of pages13
JournalIndonesian Journal of Electrical Engineering and Computer Science
Volume23
Issue number2
DOIs
Publication statusPublished - Aug 2021

Keywords

  • Cyber security
  • Fuzzy logic
  • Metaheuristic algorithm
  • Phishing attack detection
  • Phishing websites dataset
  • Website phishing dataset

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications
  • Control and Optimization
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection'. Together they form a unique fingerprint.

Cite this