2022
DOI: 10.3390/cryptography6020024
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation

Abstract: This paper introduces a novel detection method for phishing website attacks while avoiding the issues associated with the deficiencies of the knowledge-based representation and the binary decision. The suggested detection method was performed using Fuzzy Rule Interpolation (FRI). The FRI reasoning methods added the benefit of enhancing the robustness of fuzzy systems and effectively reducing the system’s complexity. These benefits help the Intrusion Detection System (IDS) to generate more realistic and compreh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…The proposed FRI-Incircle method achieved a detection rate of 97.58% and effectively reduced false alerts, smoothing the boundaries between normal and attack traffic due to its fuzzy nature. The results were competitive compared to other methods in the literature [56].…”
Section: Of 31mentioning
confidence: 78%
“…The proposed FRI-Incircle method achieved a detection rate of 97.58% and effectively reduced false alerts, smoothing the boundaries between normal and attack traffic due to its fuzzy nature. The results were competitive compared to other methods in the literature [56].…”
Section: Of 31mentioning
confidence: 78%
“…Zero-day attacks are newly identified vulnerabilities or attack strategies that have not yet been patched. [49] argued that phishing attackers might use zero-day vulnerabilities to perform sophisticated, covert attacks. Until the vulnerabilities are found and fixed, existing detection techniques might not be able to recognise and counteract such assaults.…”
Section: Django Web Securitymentioning
confidence: 99%
“…Almseidin et al [18] also applied fuzzy rule interpolation for detecting phishing website attacks. Their method can handle incomplete rule bases and smooth boundaries between normal and attack traffic.…”
Section: Anomaly-basedmentioning
confidence: 99%