This paper introduces a novel detection method for phishing website attacks while avoiding the issues associated with the deficiencies of the knowledge-based representation and the binary decision. The suggested detection method was performed using Fuzzy Rule Interpolation (FRI). The FRI reasoning methods added the benefit of enhancing the robustness of fuzzy systems and effectively reducing the system’s complexity. These benefits help the Intrusion Detection System (IDS) to generate more realistic and comprehensive alerts in case of phishing attacks. The proposed method was applied to an open-source benchmark phishing website dataset. The results show that the proposed detection method obtained a 97.58% detection rate and effectively reduc...
Phishing is an instance of social engineering techniques used to deceive users into giving their sen...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have ...
Abstract — Together with the growth of Internet, e-commerce transactions play an important role in t...
Phishing Websites are forged Web pages that are created by malicious people to mimic Web pages of re...
Cyber phishing attacks are increasing rapidly, causing the world economy monetary losses. Although v...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have a...
Abstract- Detecting and identifying any phishing websites in real-time, particularly for e-banking i...
Phishing attack is a well-known cyber security attack that happens to many people around the world. ...
Phishing websites are forged web pages that are created by malicious people to mimic web pages of re...
Detecting and identifying any phishing websites in real-time, particularly for e-banking, is really ...
This study investigates and identifies parameters in a single platform based on fuzzy system and neu...
Phishing as one of the most well-known cybercrime activities is a deception of online users to steal...
Network intrusion detection systems identify malicious connections and thus help protect networks fr...
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low...
A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decisi...
Phishing is an instance of social engineering techniques used to deceive users into giving their sen...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have ...
Abstract — Together with the growth of Internet, e-commerce transactions play an important role in t...
Phishing Websites are forged Web pages that are created by malicious people to mimic Web pages of re...
Cyber phishing attacks are increasing rapidly, causing the world economy monetary losses. Although v...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have a...
Abstract- Detecting and identifying any phishing websites in real-time, particularly for e-banking i...
Phishing attack is a well-known cyber security attack that happens to many people around the world. ...
Phishing websites are forged web pages that are created by malicious people to mimic web pages of re...
Detecting and identifying any phishing websites in real-time, particularly for e-banking, is really ...
This study investigates and identifies parameters in a single platform based on fuzzy system and neu...
Phishing as one of the most well-known cybercrime activities is a deception of online users to steal...
Network intrusion detection systems identify malicious connections and thus help protect networks fr...
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low...
A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decisi...
Phishing is an instance of social engineering techniques used to deceive users into giving their sen...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have ...
Abstract — Together with the growth of Internet, e-commerce transactions play an important role in t...