TY - JOUR
T1 - Phishing detection using Grey Wolf and particle swarm optimizer
AU - Mohammad, Adel Hamdan
AU - Tahboush, Muhannad
AU - Adawy, Mohammad
AU - Alwada'n, Tariq
AU - Ghwanmeh, Sameh
AU - Husni, Moath
PY - 2024/10/1
Y1 - 2024/10/1
N2 - Phishing could be considered a worldwide problem; undoubtedly, the number of illegal websites has increased quickly. Besides that, phishing is a security attack that has several purposes, such as personal information, credit card numbers, and other information. Phishing websites look like legitimate ones, which makes it difficult to differentiate between them. There are several techniques and methods for phishing detection. The authors present two machine-learning algorithms for phishing detection. Besides that, the algorithms employed are XGBoost and random forest. Also, this study uses particle swarm optimization (PSO) and grey wolf optimizer (GWO), which are considered metaheuristic algorithms. This research used the Mendeley dataset. Precision, recall, and accuracy are used as the evaluation criteria. Experiments are done with all features (111) and with features selected by PSO and GWO. Finally, experiments are done with the most common features selected by both PSO and GWO (PSO ∩ GWO). The result demonstrates that system performance is highly acceptable, with an F-measure of 91.4%.
AB - Phishing could be considered a worldwide problem; undoubtedly, the number of illegal websites has increased quickly. Besides that, phishing is a security attack that has several purposes, such as personal information, credit card numbers, and other information. Phishing websites look like legitimate ones, which makes it difficult to differentiate between them. There are several techniques and methods for phishing detection. The authors present two machine-learning algorithms for phishing detection. Besides that, the algorithms employed are XGBoost and random forest. Also, this study uses particle swarm optimization (PSO) and grey wolf optimizer (GWO), which are considered metaheuristic algorithms. This research used the Mendeley dataset. Precision, recall, and accuracy are used as the evaluation criteria. Experiments are done with all features (111) and with features selected by PSO and GWO. Finally, experiments are done with the most common features selected by both PSO and GWO (PSO ∩ GWO). The result demonstrates that system performance is highly acceptable, with an F-measure of 91.4%.
U2 - 10.11591/ijece.v14i5.pp5961-5969
DO - 10.11591/ijece.v14i5.pp5961-5969
M3 - Article
SN - 2088-8708
VL - 14
SP - 5961
EP - 5969
JO - International Journal of Electrical and Computer Engineering
JF - International Journal of Electrical and Computer Engineering
IS - 5
M1 - 5
ER -