Title: Applying swarm intelligence and data mining approach in detecting online and digital theft

Authors: Saba Malekpour Bejandi; Mohammad Reza Taghva; Payam Hanafizadeh

Addresses: Department of Industrial Management, Faculty of Management and Accounting, Allameh Tabataba'i University, West End Hemmat Highway, Dehkadeh-ye-Olympic, Tehran, 1489684511, Iran ' Department of Industrial Management, Allameh Tabataba'i University, Tehran, Iran ' Department of Industrial Management, Allameh Tabataba'i University, Tehran, Iran

Abstract: Various methods have been proposed to deal with phishing attacks. Using machine learning along with data mining, such as MLP techniques, is one of the practical approaches to detect these attacks. To detect phishing attacks by the neural network with proper accuracy, it is necessary to intelligently do feature selection. In this research, the emperor penguin optimiser algorithm has been used as feature selection in detecting phishing attacks by a MLP. Experiments show that the error of the proposed method for detecting phishing is less than those of WOA, BOA, and SHO algorithms. The results show that the population increase in the proposed method reduces the value of the feature selection function and phishing detection error by about 69.57% and 24.56%, respectively. The RMSE error in detecting phishing attacks in the proposed method occurred to a lesser degree in comparison with MLP, DT, SVM, and BN. The accuracy, sensitivity, and precision of the proposed method in detecting phishing attacks are 98.12%, 97.92%, and 97.88%, respectively. The proposed method is more accurate in detecting phishing attacks than methods such as GA and PSO algorithms and is more accurate than BPNN, SVM, NB, C4.5, RF, and kNN.

Keywords: phishing; fake web pages; swarm intelligence; feature selection.

DOI: 10.1504/IJICS.2022.126758

International Journal of Information and Computer Security, 2022 Vol.19 No.1/2, pp.142 - 167

Received: 15 Jul 2021
Accepted: 26 Feb 2022

Published online: 04 Nov 2022 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article