Abstract
The increased availability of wireless handheld devices and smartphones has accelerated the use of Internet for various applications. However, this proliferated usage of Internet with its vulnerabilities causes people with deceptive intentions to gain financial advantages. Phishing is one such attack carried out by the forged websites to acquire the personal credentials of the online users. The state-of-the-art methods to mitigate the phishing attacks include black list, white list, and heuristic techniques. The heuristic techniques outperform the other techniques in detection accuracy for unknown attacks. Associative Classification (AC) is an emerging heuristic technique that uses Association Rule Mining for classification. The existing AC techniques require two threshold values, viz., minimum support and minimum confidence to generate the rules. Besides, the quantitative attributes are discretized into pre-specified intervals leading to a sharp boundary problem. Therefore, to address these issues, in this paper, a novel Particle Swarm Optimization based Fuzzy Associative Classifier (PaSOFuAC) is proposed for detecting the phishing websites. PaSOFuAC improves the detection accuracy by determining the best rule which has high Rule Gain Ratio to predict the class attribute and exploiting the fuzzy logic to overcome the sharp boundary problem. The proposed approach was tested with the traditional classifiers and other AC approaches with respect to various performance measures. The experimental results reveal that PaSOFuAC outperforms the other existing techniques for detecting the phishing websites.
Similar content being viewed by others
Data Availability
Enquiries about data availability should be directed to the authors.
References
Rao, R. S., & Pais, A. R. (2019). Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications, 31(8), 3851–3873.
APWG Report. (2019). Retrieved December 2019 from https://docs.apwg.org/reports/apwg_trends_report_q3_2019.pdf
Zou, C., Deng, H., Wan, J., Wang, Z., & Deng, P. (2018). Mining and updating association rules based on fuzzy concept lattice. Future Generation Computer Systems, 82, 698–706.
Hadi, W., Aburub, F., & Alhawari, S. (2016). A new fast associative classification algorithm for detecting phishing websites. Applied Soft Computing, 48, 729–734.
Abdelhamid, N., Ayesh, A., & Thabtah, F. (2014). Phishing detection based associative classification data mining. Expert Systems with Applications, 41(13), 5948–5959.
Berlanga, F. J., Rivera, A. J., del Jesús, M. J., & Herrera, F. (2010). Gp-coach: Genetic programming-based learning of compact and accurate fuzzy rule-based classification systems for high-dimensional problems. Information Sciences, 180(8), 1183–1200.
García, D., González, A., & Pérez, R. (2014). Overview of the slave learning algorithm: A review of its evolution and prospects. International Journal of Computational Intelligence Systems, 7(6), 1194–1221.
Wu, J.M.-T., Zhan, J., & Lin, J.C.-W. (2017). An aco-based approach to mine high-utility itemsets. Knowledge-Based Systems, 116, 102–113.
Tan, C. L. (2018). Phishing dataset for machine learning: Feature evaluation, mendeley data, v1. Retrieved October 2019 from https://doi.org/10.17632/h3cgnj8hft.1
Tan, C. L., Chiew, K. L., Wong, K. S., et al. (2016). Phishwho: Phishing webpage detection via identity keywords extraction and target domain name finder. Decision Support Systems, 88, 18–27.
Moghimi, M., & Varjani, A. Y. (2016). New rule-based phishing detection method. Expert Systems with Applications, 53, 231–242.
Marchal, S., François, J., State, R., & Engel, T. (2014). Phishstorm: Detecting phishing with streaming analytics. IEEE Transactions on Network and Service Management, 11(4), 458–471.
Zouina, M., & Outtaj, B. (2017). A novel lightweight URL phishing detection system using SVM and similarity index. Human-centric Computing and Information Sciences, 7(1), 17.
Mohammad, R. M., Thabtah, F., & McCluskey, L. (2014). Predicting phishing websites based on self-structuring neural network. Neural Computing and Applications, 25(2), 443–458.
Gupta, S., & Singhal, A. (2017). Phishing URL detection by using artificial neural network with PSO. In 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (pp. 1–6). IEEE.
Jeeva, S. C., & Rajsingh, E. B. (2016). Intelligent phishing URL detection using association rule mining. Human-centric Computing and Information Sciences, 6(1), 1–19.
Abdelhamid, N. (2015). Multi-label rules for phishing classification. Applied Computing and Informatics, 11(1), 29–46.
Elkano, M., Galar, M., Sanz, J. A., Schiavo, P. F., Pereira, S., Jr., Dimuro, G. P., et al. (2018). Consensus via penalty functions for decision making in ensembles in fuzzy rule-based classification systems. Applied Soft Computing, 67, 728–740.
Bezdek, J. C., Ehrlich, R., & Full, W. (1984). FCM: The fuzzy c-means clustering algorithm. Computers & Geosciences, 10(2–3), 191–203.
Yue, S., Wang, P., Wang, J., & Huang, T. (2013). Extension of the gap statistics index to fuzzy clustering. Soft Computing, 17(10), 1833–1846.
Likas, A., Vlassis, N., & Verbeek, J. J. (2003). The global k-means clustering algorithm. Pattern Recognition, 36(2), 451–461.
Le Capitaine, H., & Frelicot, C. (2011). A cluster-validity index combining an overlap measure and a separation measure based on fuzzy-aggregation operators. IEEE Transactions on Fuzzy Systems, 19(3), 580–588.
ŞENÖZ, E. R. (2019). Evaluation of the robustness performance of a fuzzy logic controller for active vibration control of a piezo-beam via tip mass location variation. PhD thesis, Middle East Technical University.
Kennedy, J., & Eberhart, R. (1995). Particle swarm optimization. In Proceedings of ICNN’95-International Conference on Neural Networks, (vol. 4, pp. 1942–1948). IEEE.
Cervantes, A., Galvan, I., & Isasi, P. (2005). A comparison between the Pittsburgh and Michigan approaches for the binary PSO algorithm. In 2005 IEEE Congress on Evolutionary Computation, (vol. 1, pp. 290–297). IEEE.
Robinson, J., & Rahmat-Samii, Y. (2004). Particle swarm optimization in electromagnetics. IEEE Transactions on Antennas and Propagation, 52(2), 397–407.
Afify, A. A. (2016). A fuzzy rule induction algorithm for discovering classification rules. Journal of Intelligent & Fuzzy Systems, 30(6), 3067–3085.
Liu, B., Hsu, W., Ma, Y., et al. (1998). Integrating classification and association rule mining. KDD, 98, 80–86.
Alcala-Fdez, J., Alcala, R., & Herrera, F. (2011). A fuzzy association rule-based classification model for high-dimensional problems with genetic rule selection and lateral tuning. IEEE Transactions on Fuzzy Systems, 19(5), 857–872.
Kavšek, B., & Lavrač, N. (2006). Apriori-sd: Adapting association rule learning to subgroup discovery. Applied Artificial Intelligence, 20(7), 543–583.
Alwidian, J., Hammo, B. H., & Obeid, N. (2018). Wcba: Weighted classification based on association rules algorithm for breast cancer disease. Applied Soft Computing, 62, 536–549.
Hadi, W., Issa, G., & Ishtaiwi, A. (2017). Acprism: Associative classification based on prism algorithm. Information Sciences, 417, 287–300.
Chiew, K. L., Tan, C. L., Wong, K. S., Yong, K. S. C., & Tiong, W. K. (2019). A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Information Sciences, 484, 153–166.
Zabihimayvan, M., & Doran, D. (2019). Fuzzy rough set feature selection to enhance phishing attack detection. In 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1–6). IEEE.
Liu, B., Ma, Y., & Wong, C.-K. (2001). Classification using association rules: weaknesses and enhancements. In R. L. Grossman (Ed.), Data mining for scientific and engineering applications (pp. 591–605). Springer.
Li, W., Han, J., & Pei, J. (2001). Cmar: Accurate and efficient classification based on multiple class-association rules. In Proceedings 2001 IEEE International Conference on Data Mining (pp. 369–376.) IEEE.
Yin, X., & Han, J. (2003). Cpar: Classification based on predictive association rules. In Proceedings of the 2003 SIAM International Conference on Data Mining (pp. 331–335). SIAM.
Yang, X.-S., et al. (2008). Firefly algorithm. Nature-Inspired Metaheuristic Algorithms, 20, 79–90.
Qin, A. K., Huang, V. L., & Suganthan, P. N. (2008). Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Transactions on Evolutionary Computation, 13(2), 398–417.
KEEL Repository. (2019). Retrieved October 2019 from http://sci2s.ugr.es/keel/datasets.php
González, A., & Pérez, R. (2001). Selection of relevant features in a fuzzy genetic learning algorithm. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 31(3), 417–425.
Mansoori, E. G., Zolghadri, M. J., & Katebi, S. D. (2008). Sgerd: A steady-state genetic algorithm for extracting fuzzy classification rules from data. IEEE Transactions on Fuzzy Systems, 16(4), 1061–1071.
Antonelli, M., Ducange, P., Marcelloni, F., & Segatori, A. (2015). A novel associative classification model based on a fuzzy frequent pattern mining algorithm. Expert Systems with Applications, 42(4), 2086–2097.
Slima, I. B., & Borgi, A. (2018). Supervised methods for regrouping attributes in fuzzy rule-based classification systems. Applied Intelligence, 48(12), 4577–4593.
Demšar, J. (2006). Statistical comparisons of classifiers over multiple data sets. Journal of Machine Learning Research, 7(Jan), 1–30.
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have not disclosed any competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Priya, S., Selvakumar, S. & velusamy, R.L. PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites. Wireless Pers Commun 125, 755–784 (2022). https://doi.org/10.1007/s11277-022-09576-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09576-3