2023
DOI: 10.3390/biomimetics8020197
|View full text |Cite
|
Sign up to set email alerts
|

Building an Effective Classifier for Phishing Web Pages Detection: A Quantum-Inspired Biomimetic Paradigm Suitable for Big Data Analytics of Cyber Attacks

Saad M. Darwish,
Dheyauldeen A. Farhan,
Adel A. Elzoghabi

Abstract: To combat malicious domains, which serve as a key platform for a wide range of attacks, domain name service (DNS) data provide rich traces of Internet activities and are a powerful resource. This paper presents new research that proposes a model for finding malicious domains by passively analyzing DNS data. The proposed model builds a real-time, accurate, middleweight, and fast classifier by combining a genetic algorithm for selecting DNS data features with a two-step quantum ant colony optimization (QABC) alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 74 publications
0
2
0
Order By: Relevance
“…This paper addresses two primary objectives: identifying optimal classifiers for detecting phishing among twenty-four options and determining the feature identificationtechniques for malicious url datasets. [12]Through evaluation of two datasets using eight metrics, the study concludes that J-48 classifiers & FilteredClassifier, exhibit superior performance in detection, while the InfoGainAttributeEval process stands as the most effective feature detection method among the considered [10] [18].…”
Section: Literature Reviewmentioning
confidence: 94%
“…This paper addresses two primary objectives: identifying optimal classifiers for detecting phishing among twenty-four options and determining the feature identificationtechniques for malicious url datasets. [12]Through evaluation of two datasets using eight metrics, the study concludes that J-48 classifiers & FilteredClassifier, exhibit superior performance in detection, while the InfoGainAttributeEval process stands as the most effective feature detection method among the considered [10] [18].…”
Section: Literature Reviewmentioning
confidence: 94%
“…The advancement of optimization techniques, driven by an expansion in scientific knowledge, has led to notable breakthroughs in various fields, including cybersecurity [ 3 ]. Artificial intelligence (AI) plays a pivotal role in this evolution, especially through the development of bio-inspired optimization algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…They encompass various branches of engineering, including mechanical engineering (automotive [ 20 , 21 ], aerospace [ 22 ], fluid dynamics [ 23 ], thermal engineering [ 24 ], automation [ 25 ], robotics [ 26 ], mechatronics [ 27 ], MEMS [ 28 , 29 ], etc. ), electrical engineering [ 30 ] (including power engineering [ 31 ], electronics [ 32 ], microelectronics [ 33 ] and nanoelectronics [ 33 ], control engineering [ 34 ], renewable energy [ 35 ], biomedical engineering [ 36 ], telecommunications [ 36 ], signal processing [ 37 ]), geometrical optics [ 38 ], photonics [ 39 ], nanophotonics and nanoplasmonics [ 40 ], image processing [ 41 ] including pattern recognition [ 42 ], computing [ 30 ], [ 43 ], networking (computer networks [ 44 ] including Internet and Intranet [ 45 ], social networks [ 46 ], networks on a chip [ 47 ], optical networks [ 48 ], cellular (mobile) networks [ 49 ], wireless sensor networks [ 50 ], Internet of things [ 51 ], etc. ), data clustering and mining [ 52 ], civil engineering [ 53 , 54 ], architectural design [ 55 ], urban engineering [ 56 ], smart cities [ 57 ], traffic control and engineering [ 58 ], biomedicine and healthcare […”
Section: Introductionmentioning
confidence: 99%