Skip to main content
Log in

PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The increased availability of wireless handheld devices and smartphones has accelerated the use of Internet for various applications. However, this proliferated usage of Internet with its vulnerabilities causes people with deceptive intentions to gain financial advantages. Phishing is one such attack carried out by the forged websites to acquire the personal credentials of the online users. The state-of-the-art methods to mitigate the phishing attacks include black list, white list, and heuristic techniques. The heuristic techniques outperform the other techniques in detection accuracy for unknown attacks. Associative Classification (AC) is an emerging heuristic technique that uses Association Rule Mining for classification. The existing AC techniques require two threshold values, viz., minimum support and minimum confidence to generate the rules. Besides, the quantitative attributes are discretized into pre-specified intervals leading to a sharp boundary problem. Therefore, to address these issues, in this paper, a novel Particle Swarm Optimization based Fuzzy Associative Classifier (PaSOFuAC) is proposed for detecting the phishing websites. PaSOFuAC improves the detection accuracy by determining the best rule which has high Rule Gain Ratio to predict the class attribute and exploiting the fuzzy logic to overcome the sharp boundary problem. The proposed approach was tested with the traditional classifiers and other AC approaches with respect to various performance measures. The experimental results reveal that PaSOFuAC outperforms the other existing techniques for detecting the phishing websites.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data Availability

Enquiries about data availability should be directed to the authors.

References

  1. Rao, R. S., & Pais, A. R. (2019). Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications, 31(8), 3851–3873.

    Article  Google Scholar 

  2. APWG Report. (2019). Retrieved December 2019 from https://docs.apwg.org/reports/apwg_trends_report_q3_2019.pdf

  3. Zou, C., Deng, H., Wan, J., Wang, Z., & Deng, P. (2018). Mining and updating association rules based on fuzzy concept lattice. Future Generation Computer Systems, 82, 698–706.

    Article  Google Scholar 

  4. Hadi, W., Aburub, F., & Alhawari, S. (2016). A new fast associative classification algorithm for detecting phishing websites. Applied Soft Computing, 48, 729–734.

    Article  Google Scholar 

  5. Abdelhamid, N., Ayesh, A., & Thabtah, F. (2014). Phishing detection based associative classification data mining. Expert Systems with Applications, 41(13), 5948–5959.

    Article  Google Scholar 

  6. Berlanga, F. J., Rivera, A. J., del Jesús, M. J., & Herrera, F. (2010). Gp-coach: Genetic programming-based learning of compact and accurate fuzzy rule-based classification systems for high-dimensional problems. Information Sciences, 180(8), 1183–1200.

    Article  Google Scholar 

  7. García, D., González, A., & Pérez, R. (2014). Overview of the slave learning algorithm: A review of its evolution and prospects. International Journal of Computational Intelligence Systems, 7(6), 1194–1221.

    Article  Google Scholar 

  8. Wu, J.M.-T., Zhan, J., & Lin, J.C.-W. (2017). An aco-based approach to mine high-utility itemsets. Knowledge-Based Systems, 116, 102–113.

    Article  Google Scholar 

  9. Tan, C. L. (2018). Phishing dataset for machine learning: Feature evaluation, mendeley data, v1. Retrieved October 2019 from https://doi.org/10.17632/h3cgnj8hft.1

  10. Tan, C. L., Chiew, K. L., Wong, K. S., et al. (2016). Phishwho: Phishing webpage detection via identity keywords extraction and target domain name finder. Decision Support Systems, 88, 18–27.

    Article  Google Scholar 

  11. Moghimi, M., & Varjani, A. Y. (2016). New rule-based phishing detection method. Expert Systems with Applications, 53, 231–242.

    Article  Google Scholar 

  12. Marchal, S., François, J., State, R., & Engel, T. (2014). Phishstorm: Detecting phishing with streaming analytics. IEEE Transactions on Network and Service Management, 11(4), 458–471.

    Article  Google Scholar 

  13. Zouina, M., & Outtaj, B. (2017). A novel lightweight URL phishing detection system using SVM and similarity index. Human-centric Computing and Information Sciences, 7(1), 17.

    Article  Google Scholar 

  14. Mohammad, R. M., Thabtah, F., & McCluskey, L. (2014). Predicting phishing websites based on self-structuring neural network. Neural Computing and Applications, 25(2), 443–458.

    Article  Google Scholar 

  15. Gupta, S., & Singhal, A. (2017). Phishing URL detection by using artificial neural network with PSO. In 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (pp. 1–6). IEEE.

  16. Jeeva, S. C., & Rajsingh, E. B. (2016). Intelligent phishing URL detection using association rule mining. Human-centric Computing and Information Sciences, 6(1), 1–19.

    Article  Google Scholar 

  17. Abdelhamid, N. (2015). Multi-label rules for phishing classification. Applied Computing and Informatics, 11(1), 29–46.

    Article  Google Scholar 

  18. Elkano, M., Galar, M., Sanz, J. A., Schiavo, P. F., Pereira, S., Jr., Dimuro, G. P., et al. (2018). Consensus via penalty functions for decision making in ensembles in fuzzy rule-based classification systems. Applied Soft Computing, 67, 728–740.

    Article  Google Scholar 

  19. Bezdek, J. C., Ehrlich, R., & Full, W. (1984). FCM: The fuzzy c-means clustering algorithm. Computers & Geosciences, 10(2–3), 191–203.

    Article  Google Scholar 

  20. Yue, S., Wang, P., Wang, J., & Huang, T. (2013). Extension of the gap statistics index to fuzzy clustering. Soft Computing, 17(10), 1833–1846.

    Article  Google Scholar 

  21. Likas, A., Vlassis, N., & Verbeek, J. J. (2003). The global k-means clustering algorithm. Pattern Recognition, 36(2), 451–461.

    Article  Google Scholar 

  22. Le Capitaine, H., & Frelicot, C. (2011). A cluster-validity index combining an overlap measure and a separation measure based on fuzzy-aggregation operators. IEEE Transactions on Fuzzy Systems, 19(3), 580–588.

    Article  Google Scholar 

  23. ŞENÖZ, E. R. (2019). Evaluation of the robustness performance of a fuzzy logic controller for active vibration control of a piezo-beam via tip mass location variation. PhD thesis, Middle East Technical University.

  24. Kennedy, J., & Eberhart, R. (1995). Particle swarm optimization. In Proceedings of ICNN’95-International Conference on Neural Networks, (vol. 4, pp. 1942–1948). IEEE.

  25. Cervantes, A., Galvan, I., & Isasi, P. (2005). A comparison between the Pittsburgh and Michigan approaches for the binary PSO algorithm. In 2005 IEEE Congress on Evolutionary Computation, (vol. 1, pp. 290–297). IEEE.

  26. Robinson, J., & Rahmat-Samii, Y. (2004). Particle swarm optimization in electromagnetics. IEEE Transactions on Antennas and Propagation, 52(2), 397–407.

    Article  MathSciNet  Google Scholar 

  27. Afify, A. A. (2016). A fuzzy rule induction algorithm for discovering classification rules. Journal of Intelligent & Fuzzy Systems, 30(6), 3067–3085.

    Article  Google Scholar 

  28. Liu, B., Hsu, W., Ma, Y., et al. (1998). Integrating classification and association rule mining. KDD, 98, 80–86.

    Google Scholar 

  29. Alcala-Fdez, J., Alcala, R., & Herrera, F. (2011). A fuzzy association rule-based classification model for high-dimensional problems with genetic rule selection and lateral tuning. IEEE Transactions on Fuzzy Systems, 19(5), 857–872.

    Article  Google Scholar 

  30. Kavšek, B., & Lavrač, N. (2006). Apriori-sd: Adapting association rule learning to subgroup discovery. Applied Artificial Intelligence, 20(7), 543–583.

    Article  Google Scholar 

  31. Alwidian, J., Hammo, B. H., & Obeid, N. (2018). Wcba: Weighted classification based on association rules algorithm for breast cancer disease. Applied Soft Computing, 62, 536–549.

    Article  Google Scholar 

  32. Hadi, W., Issa, G., & Ishtaiwi, A. (2017). Acprism: Associative classification based on prism algorithm. Information Sciences, 417, 287–300.

    Article  Google Scholar 

  33. Chiew, K. L., Tan, C. L., Wong, K. S., Yong, K. S. C., & Tiong, W. K. (2019). A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Information Sciences, 484, 153–166.

    Article  Google Scholar 

  34. Zabihimayvan, M., & Doran, D. (2019). Fuzzy rough set feature selection to enhance phishing attack detection. In 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1–6). IEEE.

  35. Liu, B., Ma, Y., & Wong, C.-K. (2001). Classification using association rules: weaknesses and enhancements. In R. L. Grossman (Ed.), Data mining for scientific and engineering applications (pp. 591–605). Springer.

    Chapter  Google Scholar 

  36. Li, W., Han, J., & Pei, J. (2001). Cmar: Accurate and efficient classification based on multiple class-association rules. In Proceedings 2001 IEEE International Conference on Data Mining (pp. 369–376.) IEEE.

  37. Yin, X., & Han, J. (2003). Cpar: Classification based on predictive association rules. In Proceedings of the 2003 SIAM International Conference on Data Mining (pp. 331–335). SIAM.

  38. Yang, X.-S., et al. (2008). Firefly algorithm. Nature-Inspired Metaheuristic Algorithms, 20, 79–90.

    Google Scholar 

  39. Qin, A. K., Huang, V. L., & Suganthan, P. N. (2008). Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Transactions on Evolutionary Computation, 13(2), 398–417.

    Article  Google Scholar 

  40. KEEL Repository. (2019). Retrieved October 2019 from http://sci2s.ugr.es/keel/datasets.php

  41. González, A., & Pérez, R. (2001). Selection of relevant features in a fuzzy genetic learning algorithm. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 31(3), 417–425.

    Article  Google Scholar 

  42. Mansoori, E. G., Zolghadri, M. J., & Katebi, S. D. (2008). Sgerd: A steady-state genetic algorithm for extracting fuzzy classification rules from data. IEEE Transactions on Fuzzy Systems, 16(4), 1061–1071.

    Article  Google Scholar 

  43. Antonelli, M., Ducange, P., Marcelloni, F., & Segatori, A. (2015). A novel associative classification model based on a fuzzy frequent pattern mining algorithm. Expert Systems with Applications, 42(4), 2086–2097.

    Article  Google Scholar 

  44. Slima, I. B., & Borgi, A. (2018). Supervised methods for regrouping attributes in fuzzy rule-based classification systems. Applied Intelligence, 48(12), 4577–4593.

    Article  Google Scholar 

  45. Demšar, J. (2006). Statistical comparisons of classifiers over multiple data sets. Journal of Machine Learning Research, 7(Jan), 1–30.

    MathSciNet  MATH  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Priya.

Ethics declarations

Conflict of interest

The authors have not disclosed any competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Priya, S., Selvakumar, S. & velusamy, R.L. PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites. Wireless Pers Commun 125, 755–784 (2022). https://doi.org/10.1007/s11277-022-09576-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09576-3

Keywords

Navigation