A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based sys...
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Advanced Engineering and Science
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/31865/ http://umpir.ump.edu.my/id/eprint/31865/1/Paper_MCP19006.pdf |
| _version_ | 1848823877296193536 |
|---|---|
| author | Noor Syahirah, Nordin Mohd Arfian, Ismail Tole, Sutikno Shahreen, Kasim Rohayanti, Hassan Zalmiyah, Zakaria Mohd Saberi, Mohamad |
| author_facet | Noor Syahirah, Nordin Mohd Arfian, Ismail Tole, Sutikno Shahreen, Kasim Rohayanti, Hassan Zalmiyah, Zakaria Mohd Saberi, Mohamad |
| author_sort | Noor Syahirah, Nordin |
| building | UMP Institutional Repository |
| collection | Online Access |
| description | Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure. |
| first_indexed | 2025-11-15T03:04:07Z |
| format | Article |
| id | ump-31865 |
| institution | Universiti Malaysia Pahang |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T03:04:07Z |
| publishDate | 2021 |
| publisher | Institute of Advanced Engineering and Science |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | ump-318652021-08-23T09:15:32Z http://umpir.ump.edu.my/id/eprint/31865/ A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection Noor Syahirah, Nordin Mohd Arfian, Ismail Tole, Sutikno Shahreen, Kasim Rohayanti, Hassan Zalmiyah, Zakaria Mohd Saberi, Mohamad QA Mathematics QA75 Electronic computers. Computer science QA76 Computer software Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure. Institute of Advanced Engineering and Science 2021-08 Article PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/31865/1/Paper_MCP19006.pdf Noor Syahirah, Nordin and Mohd Arfian, Ismail and Tole, Sutikno and Shahreen, Kasim and Rohayanti, Hassan and Zalmiyah, Zakaria and Mohd Saberi, Mohamad (2021) A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection. Indonesian Journal of Electrical Engineering and Computer Science, 23 (2). pp. 1146-1158. ISSN 2502-4752. (Published) DOI:http://10.11591/ijeecs.v23.i2.pp1146-1158 DOI: http://10.11591/ijeecs.v23.i2.pp1146-1158 |
| spellingShingle | QA Mathematics QA75 Electronic computers. Computer science QA76 Computer software Noor Syahirah, Nordin Mohd Arfian, Ismail Tole, Sutikno Shahreen, Kasim Rohayanti, Hassan Zalmiyah, Zakaria Mohd Saberi, Mohamad A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
| title | A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
| title_full | A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
| title_fullStr | A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
| title_full_unstemmed | A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
| title_short | A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
| title_sort | comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
| topic | QA Mathematics QA75 Electronic computers. Computer science QA76 Computer software |
| url | http://umpir.ump.edu.my/id/eprint/31865/ http://umpir.ump.edu.my/id/eprint/31865/ http://umpir.ump.edu.my/id/eprint/31865/ http://umpir.ump.edu.my/id/eprint/31865/1/Paper_MCP19006.pdf |