A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection

Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based sys...

Full description

Bibliographic Details
Main Authors: Noor Syahirah, Nordin, Mohd Arfian, Ismail, Tole, Sutikno, Shahreen, Kasim, Rohayanti, Hassan, Zalmiyah, Zakaria, Mohd Saberi, Mohamad
Format: Article
Language:English
Published: Institute of Advanced Engineering and Science 2021
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/31865/
http://umpir.ump.edu.my/id/eprint/31865/1/Paper_MCP19006.pdf
_version_ 1848823877296193536
author Noor Syahirah, Nordin
Mohd Arfian, Ismail
Tole, Sutikno
Shahreen, Kasim
Rohayanti, Hassan
Zalmiyah, Zakaria
Mohd Saberi, Mohamad
author_facet Noor Syahirah, Nordin
Mohd Arfian, Ismail
Tole, Sutikno
Shahreen, Kasim
Rohayanti, Hassan
Zalmiyah, Zakaria
Mohd Saberi, Mohamad
author_sort Noor Syahirah, Nordin
building UMP Institutional Repository
collection Online Access
description Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure.
first_indexed 2025-11-15T03:04:07Z
format Article
id ump-31865
institution Universiti Malaysia Pahang
institution_category Local University
language English
last_indexed 2025-11-15T03:04:07Z
publishDate 2021
publisher Institute of Advanced Engineering and Science
recordtype eprints
repository_type Digital Repository
spelling ump-318652021-08-23T09:15:32Z http://umpir.ump.edu.my/id/eprint/31865/ A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection Noor Syahirah, Nordin Mohd Arfian, Ismail Tole, Sutikno Shahreen, Kasim Rohayanti, Hassan Zalmiyah, Zakaria Mohd Saberi, Mohamad QA Mathematics QA75 Electronic computers. Computer science QA76 Computer software Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure. Institute of Advanced Engineering and Science 2021-08 Article PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/31865/1/Paper_MCP19006.pdf Noor Syahirah, Nordin and Mohd Arfian, Ismail and Tole, Sutikno and Shahreen, Kasim and Rohayanti, Hassan and Zalmiyah, Zakaria and Mohd Saberi, Mohamad (2021) A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection. Indonesian Journal of Electrical Engineering and Computer Science, 23 (2). pp. 1146-1158. ISSN 2502-4752. (Published) DOI:http://10.11591/ijeecs.v23.i2.pp1146-1158 DOI: http://10.11591/ijeecs.v23.i2.pp1146-1158
spellingShingle QA Mathematics
QA75 Electronic computers. Computer science
QA76 Computer software
Noor Syahirah, Nordin
Mohd Arfian, Ismail
Tole, Sutikno
Shahreen, Kasim
Rohayanti, Hassan
Zalmiyah, Zakaria
Mohd Saberi, Mohamad
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_full A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_fullStr A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_full_unstemmed A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_short A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_sort comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
topic QA Mathematics
QA75 Electronic computers. Computer science
QA76 Computer software
url http://umpir.ump.edu.my/id/eprint/31865/
http://umpir.ump.edu.my/id/eprint/31865/
http://umpir.ump.edu.my/id/eprint/31865/
http://umpir.ump.edu.my/id/eprint/31865/1/Paper_MCP19006.pdf