A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases
<p>The triangular membership function.</p> "> Figure 2
<p>The interpolation conditions extraction procedure based on the factor parameters.</p> "> Figure 3
<p>The general architecture of the proposed threefold approach.</p> "> Figure 4
<p>The results of the threefold approach evaluation compared to other FRI methods [<a href="#B22-computers-13-00291" class="html-bibr">22</a>,<a href="#B25-computers-13-00291" class="html-bibr">25</a>], based on benchmark metric (1).</p> "> Figure 5
<p>The results of the threefold approach evaluation compared to other FRI methods [<a href="#B22-computers-13-00291" class="html-bibr">22</a>,<a href="#B25-computers-13-00291" class="html-bibr">25</a>], based on benchmark metric (2).</p> "> Figure 6
<p>The results of the threefold approach evaluation compared to other FRI methods [<a href="#B22-computers-13-00291" class="html-bibr">22</a>,<a href="#B25-computers-13-00291" class="html-bibr">25</a>], based on benchmark metric (3).</p> "> Figure 7
<p>The results of the threefold approach evaluation compared to other FRI methods [<a href="#B22-computers-13-00291" class="html-bibr">22</a>,<a href="#B25-computers-13-00291" class="html-bibr">25</a>], based on benchmark metric (4).</p> "> Figure 8
<p>The results of the threefold approach in the case of missing fuzzy rules (part 1).</p> "> Figure 9
<p>The results of the threefold approach in the case of missing fuzzy rules (part 2).</p> "> Figure 10
<p>The performance metrics of suggested threefold approach for the phishing attack dataset.</p> ">
Abstract
:1. Introduction
- Limited data could lead to sparse fuzzy rule scenarios, as limited data cannot be used to build complete fuzzy rules that can cover all possible observation scenarios.
- In the case of a dynamic environment, the appearance of dynamic changes in input variables not previously investigated could lead to sparse fuzzy rules. Therefore, the shift to a dynamic environment could create a lack of knowledge. In this case, the system cannot generate the required results for all possible observations due to the dynamic changes in variables in the environment.
- In a complex system, there could be a lack of knowledge, thereby causing sparse fuzzy rules to be built. Some complex systems, such as intrusion detection, face the serious challenge of a lack of knowledge. Therefore, generating complete fuzzy rules could be a serious challenge. From another perspective, the existence of inadequate fuzzy rules would also cause a sparse region into which new observations may fall.
- The development of a threefold approach by introducing a systematic three-step method to address the limitations of sparse fuzzy rules in fuzzy systems, which can make it challenging to generate the required results or conclusions.
- Introducing the factor concept, which determines the degree of participation of each neighboring fuzzy rule in handling the issue of sparse/missing fuzzy rules.
- Evaluating the suggested method using various FRI benchmark numerical metrics, the results of which demonstrate its ability to successfully handle various benchmark scenarios involving incomplete fuzzy rule sets.
- Evaluating the suggested method using an open-source real life phishing attacks dataset, the results of which demonstrated the ability of the suggested approach to handle cases of limited data availability and a lack of knowledge.
2. Related Works
3. The Proposed Threefold Approach
- Factor.R1 corresponds to Rule 1 ();
- Factor.R2 corresponds to Rule 2 ();
- Factor.R3 corresponds to Rule 3 ().
Algorithm 1 Threefold approach algorithm for single-antecedent part with two fuzzy rules |
|
4. Experiments and Results
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Mynuddin, M.; Hossain, M.I.; Khan, S.U.; Islam, M.A.; Ahad, D.M.A.; Tanvir, M.S. Cyber Security System Using Fuzzy Logic. In Proceedings of the 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19–21 July 2023; pp. 1–6. [Google Scholar]
- Johanyák, Z.C. Fuzzy rule base identification using an incremental approach. GRADUS 2021, 8, 129–136. [Google Scholar] [CrossRef]
- Murinová, P.; Pavliska, V.; Burda, M. Fuzzy association rules on data with undefined values. In Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications: 17th International Conference, IPMU 2018, Cádiz, Spain, 11–15 June 2018; Proceedings, Part III 17. Springer: Berlin/Heidelberg, Germany, 2018; pp. 165–174. [Google Scholar]
- Ruiz, M.D.; Gómez-Romero, J.; Martin-Bautista, M.J.; Vila, M.A.; Delgado, M. Fuzzy meta-association rules. In Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), Gijón, Spain, 30 June 2015; pp. 247–254. [Google Scholar]
- Li, C. Computational issue of fuzzy rule-based system. Int. J. Comput. Sci. Netw. Secur. 2006, 6, 21–30. [Google Scholar]
- Kóczy, L.; Hirota, K. Approximate reasoning by linear rule interpolation and general approximation. Int. J. Approx. Reason. 1993, 9, 197–225. [Google Scholar] [CrossRef]
- Vass, G.; Kalmár, L.; Kóczy, L. Extension of the fuzzy rule interpolation method. Proc. Int. Conf. Fuzzy Sets Theory Appl. 1992, 1–6. [Google Scholar]
- Tikk, D.; Joó, I.; Kóczy, L.; Várlaki, P.; Moser, B.; Gedeon, T.D. Stability of interpolative fuzzy KH controllers. Fuzzy Sets Syst. 2002, 125, 105–119. [Google Scholar] [CrossRef]
- Li, Y.M.; Huang, D.M.; Zhang, L.N. Weighted fuzzy interpolative reasoning method. In Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 18–21 August 2005; Volume 5, pp. 3104–3108. [Google Scholar]
- Marsala, C.; Bouchon-Meunier, B. Interpolative reasoning with multi-variable rules. In Proceedings of the Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569), Vancouver, BC, Canada, 25–28 July 2001; Volume 4, pp. 2476–2481. [Google Scholar]
- Chang, Y.C.; Chen, S.M.; Liau, C.J. Fuzzy interpolative reasoning for sparse fuzzy-rule-based systems based on the areas of fuzzy sets. IEEE Trans. Fuzzy Syst. 2008, 16, 1285–1301. [Google Scholar] [CrossRef]
- Alzubi, M.; Almseidin, M.; Alkasassbeh, M.; Al-Sawwa, J.; Aldweesh, A. Comparative Analysis of Fuzzy Rule Interpolation Techniques Across Various Scenarios Using a set of Benchmarks. IEEE Access 2024, 12, 33140–33153. [Google Scholar] [CrossRef]
- Huang, Z.; Shen, Q. Fuzzy interpolative reasoning via scale and move transformations. IEEE Trans. Fuzzy Syst. 2006, 14, 340–359. [Google Scholar] [CrossRef]
- Zhou, M.; Shang, C.; Zhang, P.; Li, G.; Jin, S.; Peng, J.; Shen, Q. Towards Rule-ranking Based Fuzzy Rule Interpolation. In Proceedings of the 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Luxembourg, 11–14 July 2021; pp. 1–7. [Google Scholar]
- Li, F.; Shang, C.; Li, Y.; Yang, J.; Shen, Q. Fuzzy rule based interpolative reasoning supported by attribute ranking. IEEE Trans. Fuzzy Syst. 2018, 26, 2758–2773. [Google Scholar] [CrossRef]
- Chen, S.M.; Chen, Z.J. Weighted fuzzy interpolative reasoning for sparse fuzzy rule-based systems based on piecewise fuzzy entropies of fuzzy sets. Inf. Sci. 2016, 329, 503–523. [Google Scholar] [CrossRef]
- Zhou, M.; Shang, C.; Li, G.; Jin, S.; Peng, J.; Shen, Q. Fuzzy Rule Interpolation with a Transformed Rule Base. In Proceedings of the 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Luxembourg, 11–14 July 2021; pp. 1–7. [Google Scholar]
- Jiang, C.; Jin, S.; Shang, C.; Shen, Q. Towards utilization of rule base structure to support fuzzy rule interpolation. Expert Syst. 2023, 40, e13097. [Google Scholar] [CrossRef]
- Lin, J.; Shang, C.; Shen, Q. Towards Dynamic Fuzzy Rule Interpolation via Density-Based Rule Promotion from Interpolated Outcomes. Mathematics 2024, 12, 402. [Google Scholar] [CrossRef]
- Chen, T.; Shang, C.; Yang, J.; Li, F.; Shen, Q. A new approach for transformation-based fuzzy rule interpolation. IEEE Trans. Fuzzy Syst. 2019, 28, 3330–3344. [Google Scholar] [CrossRef]
- Tan, Y.; Li, J.; Wonders, M.; Chao, F.; Shum, H.P.; Yang, L. Towards sparse rule base generation for fuzzy rule interpolation. In Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (Fuzz-IEEE), Vancouver, BC, Canada, 24–29 July 2016; pp. 110–117. [Google Scholar]
- Alzubi, M.; Almseidin, M.; Kovacs, S.; Al-Sawwa, J.; Alkasassbeh, M. EI-FRI: Extended Incircle Fuzzy Rule Interpolation for Multidimensional Antecedents, Multiple Fuzzy Rules, and Extrapolation Using Total Weight Measurement and Shift Ratio. J. Robot. Control. 2024, 5, 217–227. [Google Scholar] [CrossRef]
- Alzubi, M.; Kovacs, S. Some considerations and a benchmark related to the cnf property of the koczy-hirota fuzzy rule interpolation. arXiv 2019, arXiv:1911.05041. [Google Scholar] [CrossRef]
- Zhou, W.J.; Maskell, D.L.; Quek, C. Fuzzy interpolation and extrapolation using shift ratio and overall weight measurement based on areas of fuzzy sets. In Proceedings of the 2013 13th UK Workshop on Computational Intelligence (UKCI), Guildford, UK, 9–11 September 2013; pp. 46–53. [Google Scholar]
- Chen, S.M.; Ko, Y.K. Fuzzy interpolative reasoning for sparse fuzzy rule-based systems based on alpha-cuts and transformations techniques. IEEE Trans. Fuzzy Syst. 2008, 16, 1626–1648. [Google Scholar] [CrossRef]
- Chang, Y.C.; Chen, S.M.; Liau, C.J. A new fuzzy interpolative reasoning method based on the areas of fuzzy sets. In Proceedings of the 2007 IEEE International Conference on Systems, Man and Cybernetics, Montreal, QC, Canada, 7–10 October 2007; pp. 320–325. [Google Scholar]
- Li, F.; Shang, C.; Li, Y.; Yang, J.; Shen, Q. Approximate reasoning with fuzzy rule interpolation: Background and recent advances. Artif. Intell. Rev. 2021, 54, 4543–4590. [Google Scholar] [CrossRef]
- Almseidin, M.; Alkasassbeh, M.; Alzubi, M.; Al-Sawwa, J. Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation. Cryptography 2022, 6, 24. [Google Scholar] [CrossRef]
- Chen, S.M.; Cheng, S.H.; Chen, Z.J. Fuzzy interpolative reasoning based on the ratio of fuzziness of rough-fuzzy sets. Inf. Sci. 2015, 299, 394–411. [Google Scholar] [CrossRef]
- Huang, D.M.; Tsang, E.; Yeung, D. A fuzzy interpolative reasoning method. In Proceedings of the 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826), Shanghai, China, 26–29 August 2004; Volume 3, pp. 1826–1830. [Google Scholar]
- Hsiao, W.H.; Chen, S.M.; Lee, C.H. A new interpolative reasoning method in sparse rule-based systems. Fuzzy Sets Syst. 1998, 93, 17–22. [Google Scholar] [CrossRef]
- Tan, C.L. Phishing dataset for machine learning: Feature evaluation. Mendeley Data 2018, 1, 2018. [Google Scholar]
- Chiew, K.L.; Tan, C.L.; Wong, K.; Yong, K.S.; Tiong, W.K. A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf. Sci. 2019, 484, 153–166. [Google Scholar] [CrossRef]
- He, M.; Horng, S.J.; Fan, P.; Khan, M.K.; Run, R.S.; Lai, J.L.; Chen, R.J.; Sutanto, A. An efficient phishing webpage detector. Expert Syst. Appl. 2011, 38, 12018–12027. [Google Scholar] [CrossRef]
- Guillaume, S.; Charnomordic, B. Learning interpretable Fuzzy Inference Systems with FisPro. Int. J. Inf. Sci. 2011, 181, 4409–4427. [Google Scholar] [CrossRef]
Reference | Method | Contributions | Evaluation Procedure |
---|---|---|---|
[6] | KH Method | Linear interpolation, adaptation of similarity concept, multi-dimensional variable space | Benchmark metrics |
[7] | Enhanced KH Method | Modification based on alpha-cut values, address abnormal results | Benchmark metrics |
[8] | KH-Stabilized Method | Overcoming abnormality conclusions, weighted distance adaptation | Benchmark metrics |
[10] | Extension of Linear Reasoning | Analogical technique, addressing issues related to existing fuzzy rules | Benchmark metrics |
[9] | Weighted Fuzzy Interpolative Reasoning | Adaptation of the center of gravity, interpolation for trapezoidal fuzzy sets | Benchmark metrics |
[11] | Area-Adaptive Interpolation | Adaptation of fuzzy set area, convexity, and normality in results | Benchmark metrics |
[16] | Weighted Fuzzy Rules | Piecewise fuzzy entropies, characterization of interpolation points, extraction of piecewise values | Experimental datasets |
[14] | Feature Ranking for FRI | Interpolation based on feature selection algorithm, handling cases of missing fuzzy rules | Experimental datasets |
[15] | FRI with Feature Selection Algorithms | Employed feature selection techniques (IG, RF, LS, LLCFS) | Experimental datasets |
[13] | Scale and Move Method | Handling various fuzzy set shapes, nearest two existing fuzzy rules, normality and convexity in results | Benchmark metrics |
[17] | Mahalanobis Distance in FRI | Adaptation of Mahalanobis distance matrix, transformation of sparse rule base | Benchmark metrics |
[18] | Isomorphic Data Space FRI | Transformation of fuzzy rules space, reduction of generated fuzzy rules | Experimental datasets |
[20] | Random Subset FRI | Selection of a random subset of sparse fuzzy rules with a weighting factor, handling missing fuzzy rules | Experimental datasets |
[21] | Sparse Fuzzy Rule Generation | Identification and optimization of important fuzzy rules for sparse regions | Experimental datasets |
[22] | Enhancement of incircle FRI method | Modify the weights, use the shift technique | Benchmark metrics |
[19] | Dynamic FRI method | Integrated the OPTICS clustering | Experimental datasets |
Benchmark Metric | Antecedent Part | Consequent Part | Shape |
---|---|---|---|
Metric 1 | A1 = [0 5 4 ], A2 = [11 13 14], = [7 8 9 ] | B1 = [0 2 4 ], B2 = [10 11 13] | Triangular, triangular |
Metric 2 | A1 = [0 5 6], A2 = [11 13 14], = [8 8 8] | B1 = [0 2 4 ], B2 = [10 11 13] | Triangular, singleton |
Metric 3 | A1 = [3 3 3 ], A2 = [11 13 14], = [5 7 9 ] | B1 = [4 4 4 ], B2 = [10 11.5 13] | Mixed: singleton, triangular |
Metric 4 | A1 = [0 4 5 6 ], A2 = [11 12 13 14], = [6 6 9 10] | B1 = [0 2 3 4], B2 = [10 11 12 13] | Trapezoidal |
Observation | Condition (Rule1) | Condition (Rule2) | Factor.R1 | Factor.R2 | Output |
---|---|---|---|---|---|
Metric 1 | [3.11 5.77 6.7778] | [8.77 10.22 11.22] | 0.4444 | 0.5556 | [0 1.11 2.22] |
Metric 2 | [3.00 6.13 6.75] | [9.33 10.22 10.66] | 0.3750 | 0.6250 | [0.00 1.25 2.50] |
Metric 3 | [3.8 4.6 5.4] | [7.66 9.66 11.22] | 0.4 | 0.6 | [2.4 2.4 2.4] |
Metric 4 | [2.25 4.75 6.5 7.5] | [7.875 8.25 10.50 11.5] | 0.3750 | 0.6250 | [0 1.25 1.875 2.5] |
Benchmark Metric | FRI Method | Reference | Interpolated Result |
---|---|---|---|
Benchmark Metric 1 and Benchmark Metric 2 Benchmark Metric 3 and Benchmark Metric 4 | KH FRI | [6] | Metric (1) = [6.36 5.38 7.38] |
Metric (2) = [7.27 5.38 6.25] | |||
Metric (3) = [5.33 6.33 9.00] | |||
Metric (4) = [5.45 4.25 7.5 7.4] | |||
KHstab FRI | [8] | Metric (1) = [7.27 5.38 6.25] | |
Metric (2) = [7.27 5.38 6.25] | |||
Metric (3) = [5.33 6.33 9.00] | |||
Metric (4) = [5.45 4.25 7.5 7.4] | |||
VKK FRI | [7] | Metric (1) = [6.15 5.38 7.84] | |
Metric (2) = [7.00 5.38 7.00] | |||
Metric (3) = [—] | |||
Metric (4) = [5.3 4.4 7.4 7.7] | |||
CCL FRI | [11] | Metric (1) = [4.94 5.38 7.38] | |
Metric (2) = [5.38 5.38 5.38] | |||
Metric (3) = [5.33 6.33 8.33] | |||
Metric (4) = [4.25 4.25 7.5 8.5] | |||
HS FRI | [13] | Metric (1) = [5.83 6.26 7.38] | |
Metric (2) = [6.49 6.49 6.49] | |||
Metric (3) = [5.71 6.28 8.16] | |||
Metric (4) = [5.23 5.23 7.61 8.5] | |||
HTY FRI | [30] | Metric (1) = [5.76 6.42 7.30] | |
Metric (2) = [6.49 6.49 6.49] | |||
Metric (3) = [—] | |||
Metric (4) = [4.98 7.44 6.44 8.06] | |||
HCL FRI | [31] | Metric (1) = [6.36 6.58 7.38] | |
Metric (2) = [7.27 — 6.25] | |||
Metric (3) = [5.33 6.55 9.00] | |||
Metric (4) = [—] | |||
Threefold Approach | Metric (1) = [0 1.11 2.22] | ||
Metric (2) = [0 1.25 2.50] | |||
Metric (3) = [2.40 2.40 2.40] | |||
Metric (4) = [0 1.25 1.87 2.50] |
Index | The Top 5 Features of Phishing Attack Dataset | Linguistic Terms |
---|---|---|
1 | PctExtHyperlinks | L, M, H |
2 | PctExtResourceUrls | L, M, H |
3 | NumNumericChars | L, M, H |
4 | PctExtNullSelfRedirectHyperlinksRT | L, M, H |
5 | PctNullSelfRedirectHyperlinks | L, M, H |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almseidin, M.; Alzubi, M.; Al-Sawwa, J.; Alkasassbeh, M.; Alfraheed, M. A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases. Computers 2024, 13, 291. https://doi.org/10.3390/computers13110291
Almseidin M, Alzubi M, Al-Sawwa J, Alkasassbeh M, Alfraheed M. A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases. Computers. 2024; 13(11):291. https://doi.org/10.3390/computers13110291
Chicago/Turabian StyleAlmseidin, Mohammad, Maen Alzubi, Jamil Al-Sawwa, Mouhammd Alkasassbeh, and Mohammad Alfraheed. 2024. "A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases" Computers 13, no. 11: 291. https://doi.org/10.3390/computers13110291
APA StyleAlmseidin, M., Alzubi, M., Al-Sawwa, J., Alkasassbeh, M., & Alfraheed, M. (2024). A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases. Computers, 13(11), 291. https://doi.org/10.3390/computers13110291