Next Article in Journal
LLaMA 3 vs. State-of-the-Art Large Language Models: Performance in Detecting Nuanced Fake News
Previous Article in Journal
Modified Multiresolution Convolutional Neural Network for Quasi-Periodic Noise Reduction in Phase Shifting Profilometry for 3D Reconstruction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases

by
Mohammad Almseidin
1,*,†,
Maen Alzubi
2,†,
Jamil Al-Sawwa
1,†,
Mouhammd Alkasassbeh
3,† and
Mohammad Alfraheed
1,†
1
Computer Science Department, Tafila Technical University, Tafila 66110, Jordan
2
Department of Robotics and Artificial Intelligence, Jadara University, Irbid 21110, Jordan
3
Computer Science Department, Princess Sumaya University for Technology, Amman 11195, Jordan
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Computers 2024, 13(11), 291; https://doi.org/10.3390/computers13110291
Submission received: 7 October 2024 / Revised: 29 October 2024 / Accepted: 30 October 2024 / Published: 8 November 2024
(This article belongs to the Special Issue Multimedia Data and Network Security)

Abstract

:
Fuzzy systems are powerful modeling systems for uncertainty applications. In contrast to traditional crisp systems, fuzzy systems offer the opportunity to extend the binary decision to continuous space, which could offer benefits for various application areas such as intrusion detection systems (IDSs), because of their ability to measure the degree of attacks instead of making a binary decision. Furthermore, fuzzy systems offer a suitable environment that is able to deal with uncertainty. However, fuzzy systems face a critical challenge represented by the sparse fuzzy rules. Typical fuzzy systems demand complete fuzzy rules in order to offer the required results. Additionally, generating complete fuzzy rules can be difficult due to many factors, such as a lack of knowledge base or limited data availability, such as in IDS applications. Fuzzy rule interpolation (FRI) was introduced to overcome this limitation by generating the required interpolation results in cases with sparse fuzzy rules. This work introduces a threefold approach designed to address the cases of missing fuzzy rules, which uses a few fuzzy rules to handle the limitations of missing fuzzy rules. This is achieved by finding the interpolation condition of neighboring fuzzy rules. This procedure was accomplished based on the concept of factors (which determine the degree to which each neighboring fuzzy rule contributes to the interpolated results, in cases of missing fuzzy rules). The evaluation procedure for the threefold approach was conducted using the following two steps: firstly, using the FRI benchmark numerical metrics, the results demonstrated the ability of the threefold approach to generate the required results for the various benchmark scenarios. Secondly, using a real-life dataset (phishing attacks dataset), the results demonstrated the effectiveness of the suggested approach to handle cases of missing fuzzy rules in the area of phishing attacks. Consequently, the suggested threefold approach offers an opportunity to reduce the number of fuzzy rules effectively and generate the required results using only a few fuzzy rules.

1. Introduction

The rapid growth of dynamic and uncertain environments enabled the widespread use of fuzzy systems. The strengths of the fuzzy systems make them a suitable framework to address cases of uncertainty. Fuzzy systems effectively cooperate with expert knowledge, which is integrated as an important factor for the inference engine. This integration of expert knowledge produces an understandable rule-based system. Adapting the fuzzy systems in this way helps to address the issues of binary decisions. For instance, in the intrusion detection application area, the binary decision is considered a serious challenge [1]. This is due to there being no clear boundaries between normal and abnormal traffic. Therefore, the fuzzy system could be a suitable detection approach that offers an acceptable extension of the binary decision to the continuous space.
However, effectively modeling a fuzzy system faces a critical challenge, characterized by the issue of sparse fuzzy rules. The typical inference methods, such as those of Mamdani and Takagi-Suegno, required complete fuzzy rules for the modeling of fuzzy systems. In other words, the inference of a fuzzy system, which is considered a critical step, could not be initiated in the case of sparse fuzzy rules [2]. In a sparse fuzzy rules scenario, the typical classical reasoning methods could not infer the required result from the new observation. There are several reasons for the case of sparse fuzzy rules or missing fuzzy rules [3,4,5]. These reasons can be summarized as follows:
  • Limited data could lead to sparse fuzzy rule scenarios, as limited data cannot be used to build complete fuzzy rules that can cover all possible observation scenarios.
  • In the case of a dynamic environment, the appearance of dynamic changes in input variables not previously investigated could lead to sparse fuzzy rules. Therefore, the shift to a dynamic environment could create a lack of knowledge. In this case, the system cannot generate the required results for all possible observations due to the dynamic changes in variables in the environment.
  • In a complex system, there could be a lack of knowledge, thereby causing sparse fuzzy rules to be built. Some complex systems, such as intrusion detection, face the serious challenge of a lack of knowledge. Therefore, generating complete fuzzy rules could be a serious challenge. From another perspective, the existence of inadequate fuzzy rules would also cause a sparse region into which new observations may fall.
The cases of limited data availability and a lack of knowledge reflect the true nature of real-world application problems, as many application areas face these essential issues. One such domain that suffers from limited data availability and the lack of a knowledge base is phishing attacks detection and botnet attacks detection. Limited data availability and the lack of a knowledge base play a major role in limiting the fuzzy systems for these applications, due to their need for complete fuzzy rules. Therefore, in response to these critical issues, this paper introduces a novel FRI method, entitled the threefold approach. The threefold approach aims to handle the limitations of fuzzy systems in the case of sparse fuzzy rules. This benefit enables the threefold approach to be used as an inference engine in cases of limited data availability and a lack of knowledge, as found in phishing attack detection. Moreover, the threefold approach could offer an opportunity for the fuzzy system to generate the required results with missing fuzzy rules, as well as the opportunity to extend the binary decision to the continuous space. Furthermore, the suggested threefold approach could be beneficial in reducing the complexity of fuzzy systems by generating the required results using only a few fuzzy rules.
The suggested threefold approach interpolates the required results in the case of missing fuzzy rules by extracting the interpolation conditions of the new input and the existing fuzzy rules. This technique is introduced according to the factor concept. The factor concept is used to determine the degree to which each neighboring fuzzy rule contributes to the interpolated results, in the case of missing fuzzy rules. Consequently, the proposed threefold approach could be a beneficial fuzzy approach to implement in areas and applications where there is a lack of knowledge and limited data availability, such as phishing attack detection. In this paper, we break down the main contributions as follows:
  • The development of a threefold approach by introducing a systematic three-step method to address the limitations of sparse fuzzy rules in fuzzy systems, which can make it challenging to generate the required results or conclusions.
  • Introducing the factor concept, which determines the degree of participation of each neighboring fuzzy rule in handling the issue of sparse/missing fuzzy rules.
  • Evaluating the suggested method using various FRI benchmark numerical metrics, the results of which demonstrate its ability to successfully handle various benchmark scenarios involving incomplete fuzzy rule sets.
  • Evaluating the suggested method using an open-source real life phishing attacks dataset, the results of which demonstrated the ability of the suggested approach to handle cases of limited data availability and a lack of knowledge.
This paper is organized as follows: Section 2 presents related works on fuzzy rule interpolation and provides a brief overview of the studied FRI methods, including some advantages and limitations. Section 3 introduces the suggested threefold approach, including the main steps used to interpolate the required results in the case of missing fuzzy rules. This is followed by the experiments and results, which are set out in Section 4. Section 5 concludes the paper.

2. Related Works

This section presents related works on fuzzy rule interpolation. It also provides a brief overview of the studied FRI methods, including some advantages and limitations.
Kóczy and Hirota in [6] proposed one of the earliest interpolation methods (the KH method). The KH method was able to interpolate the required results using the linear interpolation technique and offered a chance to adapt the concept of similarity between fuzzy sets. Additionally, the suggested KH method could work within a multi-dimensional variable space. Furthermore, the authors introduced a linear equation for the interpolation technique. Vass et al., in [7], proposed an enhanced version of the KH method. This enhancement was summarized by modifying alpha-cut values based on the center points to avoid abnormal results. This enhancement eliminated the issue related to the abnormal results within the KH method. Furthermore, Tikk et al., in [8], noted the issue of abnormal results within the KH method, and they proposed a KH-stabilized method that overcame the abnormal conclusions by adapting the weighted distance concept.
From another perspective, Li et al., in [9], proposed another method that offered the ability to interpolate the results in the case of missing fuzzy rules. The suggested method was entitled weighted fuzzy interpolative reasoning and was concerned with adapting the center of gravity of trapezoidal fuzzy sets, in order to interpolate the required conclusions. Marsala et al., in [10], suggested an extension of linear reasoning methods using the analogical technique. This enhancement contributed to addressing the issue related to the premise of the existing fuzzy rules. The suggested method characterized the set of input variables as points of weights, where the interpolated results were determined by the location space of the observation and the shape of the observation. In [11], Chang et al. proposed a new interpolation method for addressing the missing fuzzy rules. The suggested interpolation method was designed based on adapting the area of the fuzzy set, employing the weighted technique as a baseline to interpolate the conclusion. The results generated by the suggested method were characterized by their convexity and normality. Moreover, different types of fuzzy sets could be used to interpolate the results. The suggested interpolation method was evaluated using the FRI benchmark metrics, demonstrating its effectiveness.
From another perspective, in [12], Alzubi et al. proposed a set of benchmark metrics that were designed to unify the evaluation of various FRI methods. The authors compared various FRI methods such the KH method, the incircle method, the VKK method, and others. The results demonstrated that some of the FRI methods fulfilled the suggested benchmark metrics, namely the incircle and MACI methods.
Huang et al., in [13], proposed an interpolative reasoning method using the techniques of scale and move. The suggested scale and move method was able to deal with the polygonal, triangular, and other fuzzy set shapes of membership functions. The suggested scale and move method started the interpolation procedure based on the extraction of the interpolated rule according to the nearest fuzzy rules.
Furthermore, the newly derived inference fuzzy rule was forwarded using the scale and move technique to interpolate the required results from the new observations. In terms of normality and convexity, the suggested scale and move method satisfied those metrics successfully. The suggested method was evaluated using FRI benchmark metrics, and it effectively generated the required results in cases with missing fuzzy rules. From another perspective, the feature ranking algorithms could be applied for the sake of fuzzy rule interpolation.
Zhou et al., in [14], proposed a mechanism that offered an interpolation technique based on a feature selection algorithm. The conducted experiments demonstrated the ability of the suggested method to address cases of missing fuzzy rules. Furthermore, Li et al., in [15], proposed a new FRI technique that was based on adapting various feature selection algorithms. The Information Gain (IG), Relief-F (RF), and Laplacian Score (LS) feature selection algorithms were adapted to enhance the results of the interpolated conclusion. The suggested FRI method was evaluated using several benchmark datasets. The achieved results demonstrated that the use of feature selection algorithms helped to enhance the interpolated conclusions.
Chen et al., in [16], proposed an FRI method based on defining the piecewise fuzzy entropies for each fuzzy set. The suggested FRI method aimed to characterize the initiated points of interpolation results using the representative values of each studied fuzzy set. Furthermore, the suggested FRI method extracted the piecewise values for every antecedent part of the fuzzy model. Subsequently, the weights of each fuzzy rule were calculated. The accomplished experiments demonstrated the effectiveness of the suggested FRI method. Some researchers also examined the effect of distance metrics on the interpolation of the results in cases of missing fuzzy rules.
Mou et al., in [17], proposed an FRI method that adapted the Euclidean distance within the sparse fuzzy rules when determining the nearest fuzzy rules. The suggested FRI method adapted the learned Mahalanobis distance matrix along with the learning method. This adaptation aimed to transform the existing sparse rule base into the new sparse rule base coordinate system. The transformed coordinate system was the baseline for the new observation to match the nearest fuzzy rules and adapt the required interpolation. The conducted experiments demonstrated the efficiency of the suggested FRI method, based on seven benchmark classification problems. Jiang et al., in [18], suggested a method for interpolation reasoning for cases with missing fuzzy rules. The suggested method was based on transforming the sparse fuzzy rule space into an isomorphic data space. This transformation was carried out using the mapping technique on the structural patterns of the existing fuzzy rules. This transformation assisted in defining the number of fuzzy rules that were required to handle the issue of the new observation. Moreover, it effectively reduced the number of fuzzy rules generated. The experimental results showed that the suggested FRI method effectively determined the number of fuzzy rules needed to perform the required interpolation for the new observation. In addition, in [19], Lin et al. proposed a dynamic FRI approach based on the density concept to overcome the issue related to missing fuzzy rules. The suggested FRI approach integrated the OPTICS clustering algorithm to provide and choose the most suitable candidates for fuzzy rules. The goal of using the density concept was to select suitable fuzzy rules that are frequently found. The suggested dynamic FRI approach was tested and evaluated according to open-source benchmark datasets. The conducted experiments demonstrated the effectiveness of the suggested approach.
From another perspective, Chen et al. in [20] proposed a new interpolation method to handle cases of missing fuzzy rules. The suggested FRI method employed a technique of selecting a random subset of sparse fuzzy rules, along with a weighting factor, to interpolate the results for the new observation. The suggested FRI method was tested and evaluated using various benchmark datasets. The results demonstrated the suggested FRI method’s efficiency in interpolating the results in cases of missing fuzzy rules.
These FRI methods offer a suitable way to use a few fuzzy rules to interpolate the required results. This advantage aids in reducing a large number of fuzzy rules and, at the same time, reduces the complexity of the fuzzy system. Tan et al., in [21], proposed a framework that was able to generate sparse fuzzy rules. These sparse fuzzy rules were able to handle the required conclusions. The suggested framework was initiated by identifying important fuzzy rules, which were characterized by their inability to be approximated based on neighboring fuzzy rules. The suggested framework was able to work in the sparse region. In addition, in [22], Alzubi et al. proposed an enhancement technique for the incircle FRI method. The incircle FRI method interpolates the required results by defining the weight of the center point of the incircle. The suggested enhancement technique enabled the required modifications of the weight calculations to be carried out, along with using the shift technique. This enhancement aimed to ensure that the new input could be covered, even in cases of extrapolation. The suggested enhancement encircle method was tested based on various FRI benchmark metrics. The results demonstrated that the suggested enhancement of the incircle FRI method handled the issues of extrapolation for the original incircle FRI method. Table 1 summarizes the previous related works.
The previous related works highlight the urgent need to use FRI methods to handle the issues arising in cases with a lack of knowledge and missing fuzzy rules. The suggested threefold approach focuses on defining the distance between the new input and neighboring fuzzy rules to define the suitable factor parameters, while the typical FRI methods adapted the similarity measures or geometric properties. The typical FRI methods focused on handling interpolation, where the new input occurred between two surrounded fuzzy rules, while the suggested threefold approach handles extrapolation using the factor parameters. The suggested threefold approach defines the interpolation conditions, which offer a fair continuation of each fuzzy rule to determine the expected results.

3. The Proposed Threefold Approach

This section introduces in detail the suggested threefold approach along with its main requirements and steps for implementation. Typically, in fuzzy systems, the triangular membership functions are widely used, due to their simplicity [23]. The triangular membership function can be described as ( A 1 , B 1 , C 1 ), where A 1 represents the left side, B 1 represents the height, and C 1 represents the right side. Figure 1 presents the triangular membership function.
For simplicity, in the preliminary stage of the suggested reasoning method, the two fuzzy rules A 1 B 1 and A 2 B 2 adjacent to the new observation are considered from the rule base, where A1, A2, B1, and B2 illustrate the fuzzy sets of the antecedents and consequent parts, respectively.
The first essential step of the threefold approach is to determine the distance between the current fuzzy rules and the new observation. The distance between the current fuzzy rules and the new observation can be determined as follows:
Distance ( A i , A ) = j = 1 n ( A i [ j ] A [ j ] ) 2
The existing fuzzy rules are represented by A j and the new observation is represented by A . Figure 2 illustrates the distance between fuzzy rule A i and observation A . After the distance between the current fuzzy rules and the new observation is calculated, the next step is to define the interpolation conditions of the neighboring fuzzy rules.
The interpolation conditions in the threefold approach can be defined as follows:
Condition ( R u l e i j ) = A i j [ 1 ] + Factor . R i j × ( A i [ 1 ] A i j [ 1 ] ) A i j [ 2 ] + Factor . R i j × ( A i [ 2 ] A i j [ 2 ] ) A i j [ k ] + Factor . R i j × ( A i [ k ] A i j [ k ] )
where i = 1 , 2 , , n refers to the number of inputs and j = 1 , 2 , , m refers to the number of fuzzy sets. It is worth mentioning that the derived interpolation condition in the threefold approach is based on the concept of factors. The Factor . R i j is used to determine the degree to which each neighboring fuzzy rule contributes to the interpolated results in cases of missing fuzzy rules. Factor . R i j can be calculated as the ratio distance between the new observation and the neighboring fuzzy rules, as follows:
Factor . R i j = Distance ( A i , A i j ) Total Distance ( A i j , A i ( j + 1 ) )
The aim behind using the factor parameter is to offer a balanced mechanism in the interpolation results. More precisely, each neighboring fuzzy rule has a factor parameter, which measures the effectiveness of each neighboring fuzzy rule for the new observation. This benefit allows the threefold approach to adjust the weights of the neighboring fuzzy rules dynamically.
It is worth mentioning that the previous factor parameter calculation scenario was based on the condition that the new observation’s position was between two adjacent fuzzy rules. However, in the case of the new observation’s position, if it is outside (extrapolation) two adjacent fuzzy rules, then the Factor . R i j can be calculated as follows:
F a c t o r . R i = D i s t a n c e ( A , A i ) T o t a l D i s t a n c e ( A i , A i + 1 ) r o u n d D i s t a n c e ( A , A i ) T o t a l D i s t a n c e ( A i , A i + 1 )
Regarding the factor parameter, for instance, if there are three fuzzy rules, for example ( A 1 B 1 ) , ( A 2 B 2 ) , and ( A 3 B 3 ) , each rule has its own factor value, as follows:
  • Factor.R1 corresponds to Rule 1 ( ( A 1 B 1 ) );
  • Factor.R2 corresponds to Rule 2 ( ( A 2 B 2 ) );
  • Factor.R3 corresponds to Rule 3 ( ( A 3 B 3 ) ).
The factor parameters offer the required balance for the interpolation of the required results by determining the degree to which neighboring fuzzy rule contributes to the interpolated results in cases with missing fuzzy rules. Subsequently, the final step of the threefold approach is to generate the required outputs for the new observation, which are not covered by any of the fuzzy rules. The final output for the new observation is defined as follows:
O u t p u t ( R u l e i ) = [ B i 1 + F a c t o r . R i × ( C o n d i t i o n ( R u l e i ) B i 1 ) , B i 2 + F a c t o r . R i × ( C o n d i t i o n ( R u l e i ) B i 2 ) , B i 3 + F a c t o r . R i × ( C o n d i t i o n ( R u l e i ) B i 3 ) ]
Algorithm 1 summarizes the main steps of the threefold approach for interpolating the output for the new observation A , in the case of a single-antecedent part. The general architecture of the proposed threefold approach is shown in Figure 3.
Algorithm 1 Threefold approach algorithm for single-antecedent part with two fuzzy rules
  • Require: Fuzzy rule parameters: A 1 , A 2 , B 1 , B 2 , Observation: A
    • The attribute values of the fuzzy sets: A 1 = [ a 11 , a 12 , a 13 ] , A 2 = [ a 21 , a 22 , a 23 ] , B 1 = [ b 11 , b 12 , b 13 ] , B 2 = [ b 21 , b 22 , b 23 ] , A = [ a 11 , a 12 , a 13 ] , B = [ b 11 , b 12 , b 13 ] .
  • Ensure: Fuzzy rule outputs: B Rule 1 , B Rule 2
     
    2:
    Phase 1: Calculating the distance between the new observation and the existing fuzzy rules
    3:
    Dis( A , A 1 ) = | a 12 a 12 | .
    4:
    Dis( A , A 2 ) = | a 22 a 12 | .
    5:
    Dis( A 1 , A 2 ) = | a 22 a 12 | .
     
    6:
    Phase 2: Determining the interpolation conditions based on factor concept
    7:
    Condition( R u l e 1 ) = [( a 11 + Factor. R 1 × ( a 1 a 11 )),( a 12 + Factor. R 1 × ( a 2 a 12 )), ( a 13 + Factor. R 1 × ( a 3 a 13 ))]
    8:
    Condition( R u l e 2 ) = [( a 21 + Factor. R 2 × ( a 1 a 21 )),( a 22 + Factor. R 2 × ( a 2 a 22 )), ( a 23 + Factor. R 2 × ( a 3 a 23 ))]
     
    9:
    The factor concept could measured based on two scenarios:
    1. In case the observation hits between two adjacent fuzzy rules ( A 1 B 1 and A 2 B 2 ), then, the Factor. R 1 and Factor. R 2 are as follows:
     
    10:
    if  a 2 a 12 and a 2 a 22  then
    11:
        Factor.R1 = (Dis( A , A 1 ) / Dis( A 1 , A 2 ) )
    12:
        Factor.R2 = (Dis( A , A 2 ) / Dis( A 1 , A 2 ) )
    13:
    end if
    2. In case the observation is extrapolation (outside range) adjacent fuzzy rules ( A 1 B 1 and A 2 B 2 ), then, the Factor.R1 and Factor.R2 is as follows:
     
    14:
    if  a 2 a 12 and a 2 a 22  then
    15:
        Dis. R 1 = (Dis( A , A 1 ) / Dis( A 1 , A 2 ) )
    16:
        Factor. R 1 = | Dis. R 1 − round(Dis. R 1 ) |
    17:
        Dis. R 2 = (Dis( A , A 2 ) / Dis( A 1 , A 2 ) )
    18:
        Factor. R 2 = | Dis. R 2 − round(Dis. R 2 ) |
    19:
    end if
    20:
     
     
    21:
    Phase 3: The interpolated results are computed as follows:
    22:
    Output( R u l e 1 ) = [( b 11 + Factor. R 1 × (Condition( R u l e 1 ) – b 11 )),( b 12 + Factor. R 1 × (Condition( R u l e 1 ) – b 12 )),( b 13 + Factor. R 1 × (Condition( R u l e 1 ) – b 13 ))]
    23:
    Output( R u l e 2 ) = [( b 21 + Factor. R 2 × (Condition( R u l e 2 ) – b 21 )),( b 22 + Factor. R i × (Condition( R u l e 2 ) – b 22 )),( b 23 + Factor. R 2 × (Condition( R u l e 2 ) – b 23 ))]

4. Experiments and Results

This section presents the evaluation procedure for the suggested threefold approach for cases with missing fuzzy rules and a lack of knowledge base. Fortunately, there are FRI benchmark metrics that have been introduced in [11,13,24,25,26,27], which can be used to evaluate the effectiveness of the suggested FRI method when interpolating the required results in various scenarios. Although FRI benchmark metrics provide an initial demonstration of the effectiveness of the suggested FRI method, evaluating the suggested FRI method based on a benchmark dataset offers an opportunity to evaluate its effectiveness in terms of practical applications. Therefore, the evaluation procedure of the suggested threefold approach was undertaken using the following two steps. Firstly, the FRI benchmark metrics were used to evaluate the effectiveness of FRI methods in various scenarios. Secondly, the proposed threefold approach was evaluated based on a real-life benchmark dataset (a phishing dataset). The reason behind using the phishing attacks dataset is because it is a suitable application area with limited data availability and a lack of knowledge base [28]; thus, it is a suitable environment in which to apply the FRI evaluation methods. The characteristics of the applied FRI benchmark metrics are presented in Table 2.
Benchmark metric 1 aimed to evaluate the effectiveness of the suggested threefold approach to interpolate the required results in cases of triangular fuzzy sets that represent all parts of a fuzzy system. Various FRI methods can be evaluated according to benchmark metric (1), as in [29]. The proposed threefold approach generates a meaningful conclusion to handle the scenario when evaluated using FRI benchmark metric (1). Precisely, the conclusion of the threefold approach was derived as follows: the new conditions between the antecedents and the new observation fuzzy sets (Condition( Rule i )) were calculated using Equation (2), generating Condition(Rule1) = [3.11, 5.77, 6.7778] and Condition(Rule2) = [8.77, 10.22, 11.22]. Using Equations (3) and (4), the factor variables were computed as follows: Factor.R1 = 0.4444 and Factor.R2 = 0.5556. Then, the results of the factor values were used to calculate the Output( Rule i ) using Equation (5). Then, the new conditions of the output were represented as Output(Rule1) = [0, 1.11, 2.22] and Output(Rule2) = [4.44, 4.88, 5.77]. Finally, based on the factor values, the minimum value was selected, which was close to the observation. Therefore, the final result of this benchmark metric was Output(Rule1) = [0, 1.11, 2.22], which is close to the Rule 1 shown in Figure 4.
In terms of benchmark metric 2, this benchmark metric aimed to evaluate the effectiveness of the proposed threefold approach in a scenario where the observation appeared as a singleton fuzzy set. The suggested threefold approach was able to successfully interpolate the required fuzzy rules able to handle the issue related to benchmark metric (2). The conclusion of the threefold approach was derived as follows: the new conditions between the antecedents and the new observation fuzzy sets (Condition( Rule i )) were calculated using Equation (2), generating Condition(Rule1) = [3.00, 6.13, 6.75] and Condition(Rule2) = [9.33, 10.22, 10.66]. Using Equations (3) and (4), the factor variables were computed, resulting in Factor.R1 = 0.3750 and Factor.R2 = 0.6250. Thereafter, the results of the factor values were used to calculate the Output( Rule i ), using Equation (5). Therefore, the new conditions of the output were represented as Output(Rule1) = [0.00, 1.25, 2.50] and Output(Rule2) = [4.44, 4.88, 5.77]. Finally, based on the factor values, the minimum value was selected, which was close to the new observation. The final result of this benchmark metric was Output(Rule1) = [0.00, 1.25, 2.50], which was close to the Rule1 shown in Figure 5. The suggested threefold approach was able to interpolate the required conclusion for benchmark metric (2). With regards to [29], the suggested threefold approach was able to generate the required conclusion for this scenario of fuzzy set shapes.
The suggested threefold approach successfully generated the required conclusion for the previous two benchmark metrics. However, in the case of mixed-shape fuzzy sets, where the singleton fuzzy sets illustrated the rule ( A 1 , B 1 ) and the triangular fuzzy sets illustrated the rule ( A 2 , B 2 ), the new observation appeared as a triangular fuzzy set. This case reflected benchmark metric 3.
The suggested threefold approach was able to handle the scenario of FRI benchmark metric (3) as the new condition between the antecedents and the observation fuzzy sets (Condition( Rule i )), which was calculated using Equation (2) and generated Condition(Rule1) = [3.8, 4.6, 5.4] and Condition(Rule2) = [7.66, 9.66, 11.22]. Using Equations (3) and (4), the factor variables were computed, which totaled Factor.R1 = 0.4 and Factor.R2 = 0.6. Then, the results of the factor values were used to calculate the Output( Rule i ), using Equation (5). Subsequently, the new conditions of the output were Output(Rule1) = [2.4, 2.4, 2.4] and Output(Rule2) = [4.44, 5.11, 5.77]. Finally, based on the factor values, the minimum value was selected, which was close to the new observation. Therefore, the final result of this benchmark metric was Output(Rule1) = [2.4, 2.4, 2.4], which was close to the Rule1 shown in Figure 6.
Benchmark metric 4 aimed to evaluate the effectiveness of the suggested threefold approach when using a trapezoidal fuzzy set. The threefold approach effectively generated the required fuzzy rules that could handle the new observation that appeared in the sparse region. The suggested threefold approach also derived the required conclusion for this benchmark metric through the calculation of new conditions between the antecedents and the observation fuzzy sets (Condition( Rule i )), using Equation (2), which were Condition(Rule1) = [2.25, 4.75, 6.5, 7.5], and Condition(Rule2) = [7.875, 8.25, 10.50, 11.5]. Using Equations (3) and (4), the factor variables were computed as Factor.R1 = 0.3750 and Factor.R2 = 0.6250. Then, the results of the factor values were used to calculate the Output ( Rule i ), using Equation (5). Subsequently, the new conditions of the output were Output(Rule1) = [0, 1.25, 1.875, 2.5] and Output(Rule2) = [3.75, 4.125, 4.5, 4.875]. Finally, based on the factor values, the minimum value was close to the new observation. Therefore, the final result of this benchmark metric was Output(Rule1) = [0, 1.25, 1.875, 2.5], which was close to the Rule1 shown in Figure 7. Table 3 summarizes the accomplished results, based on the studied FRI benchmark metrics. As discussed in Section 2, significant contributions were proposed to overcome the issues related to the missing fuzzy rules. We conducted a comparative analysis with other FRI methods that employed the same benchmark metrics for more in-depth analysis. Table 4 compares the results of the evaluation of the suggested threefold approach with that of other FRI methods, employing the same FRI benchmark metrics.
To summarize the accomplished results, the suggested threefold approach was successfully evaluated using the aforementioned FRI benchmark metrics and generated the required results in cases when a sparse region appeared. For a more extensive evaluation, the next step focused on applying the suggested threefold approach to a phishing attack dataset. The domain of phishing attacks is a relevant domain that suffers from a lack of knowledge base and limited data availability. The studied phishing attack dataset was introduced by Tan et al. in [32]. It includes 10,000 instances, along with 48 features. It is worth mentioning that this number of input parameters is considered a large number of fuzzy systems. Moreover, some input parameters may not reflect the real behavior of the phishing attack. Therefore, we have extracted only the top five features that were introduced by [33,34]. In addition, the extracted top five parameters were normalized to offer more consistency for the input observations as well as to simplify the rule base, and to mitigate the effect of outliers if they existed. The extracted input parameters and their linguistic terms are presented in Table 5.
For the sake of simplicity, the triangular fuzzy set was used to represent each input parameter. The consequent part, representing the class label, was a fuzzy singleton shape. The fuzzy singleton shape was used to present the discrete crisp output. It is important to note that no optimization technique was used for the membership function values, since the core contribution of this work is to introduce the concept of the threefold approach for interpolating the required results in cases with missing fuzzy rules. Certainly, adopting optimization techniques for the membership values and fuzzy rules could enhance the performance and effectiveness of the inference engine. The fuzzy rules and membership values were learned using a classical method in [35]. The fuzzy set parameters were generated to produce an environment that had highly sparse regions. Afterward, several observations (input parameters) that were located in the sparse region and not covered by any fuzzy rules were passed to the suggested threefold approach. The experiments conducted and the results obtained demonstrated the ability of the suggested threefold approach to generate the required results in the case of sparse regions, as shown in Figure 8 and Figure 9, respectively. Figure 10 presents the performance metrics of the suggested threefold approach based on the phishing attack dataset.
The proposed threefold approach successfully interpolated the required results across various benchmark metrics and generated the required alerts for the case study involving the phishing attack dataset. This method could be suitable for use in other application areas that suffer from sparse fuzzy rules. Furthermore, the suggested approach was characterized by its ability to work even if there was only one neighboring fuzzy rule. In addition, the suggested threefold approach was able to generate the required interpolation results even in cases with mixed-shape fuzzy sets. Therefore, it was not restricted to a specific fuzzy set shape. Finally, the threefold approach was compatible with existing fuzzy rules. Specifically, it could produce accurate results when the new observation precisely matched one of the existing fuzzy rules.
Despite the promising results of the proposed threefold approach, the threefold approach results depended on the quality of the existing fuzzy rules. In other words, the results obtained here by the threefold approach could be unrealistic in cases involving low-quality fuzzy rules. One of the possible solutions is to adapt optimization algorithms as metaheuristic optimization algorithms. The metaheuristic optimization algorithms could be used to extract baseline fuzzy rules with high quality to be used to generate the required interpolated results. Moreover, achieving a balance between accurate interpolation results and a simple fuzzy system may not always be straightforward.

5. Conclusions

This paper introduced the threefold approach as a fuzzy rule interpolation reasoning method. The suggested threefold reasoning method aimed to handle the case of sparse regions in fuzzy systems with missing fuzzy rules. The suggested approach was initiated by computing the distance between the new observation and the current fuzzy rules. Subsequently, the fuzzy interpolation conditions were computed according to the neighboring fuzzy rules to determine the degree to which each neighboring fuzzy rule contributed to the interpolated results in cases with missing fuzzy rules. Consequently, the suggested threefold approach generated the required results using the computed interpolation conditions of each neighboring fuzzy rule. The suggested approach was characterized by its ability to work even if there was only one neighboring fuzzy rule. Moreover, it was able to work in the case of extrapolation, which could be beneficial in a dynamic environment. In addition, the suggested threefold approach was able to generate the required interpolation results even in the case of mixed-shape fuzzy sets. Therefore, it was not restricted to a specific fuzzy shape. The conducted experiments involved the following two scenarios. The first scenario used FRI benchmark metrics; the obtained results illustrated the effectiveness of the suggested approach in generating the required interpolation results for different FRI benchmark metric-based scenarios. The second scenario used a phishing attack dataset, which was considered a suitable candidate because it suffered from a lack of knowledge and limited data availability. The obtained results illustrated the effectiveness of the suggested approach in handling cases with missing fuzzy rules for the studied phishing attack dataset. Consequently, the suggested threefold approach could be a suitable reasoning method for handling cases with missing fuzzy rules as well as for reducing the complexity of fuzzy systems.
For future work, it could be worth extending the current threefold approach to handle cases involving different fuzzy set shapes. Moreover, it could be useful to adapt optimization algorithms for the extraction of high-quality base fuzzy rules, to be used later for interpolating results.

Author Contributions

Conceptualization, M.A. (Mohammad Almseidin) and M.A. (Mouhammd Alkasassbeh); methodology, M.A. (Mohammad Almseidin) and M.A (Maen Alzubi); software, M.A. (Maen Alzubi) and M.A. (Mohammad Alfraheed) and J.A.-S.; validation, M.A. (Maen Alzubi) and J.A.-S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Mynuddin, M.; Hossain, M.I.; Khan, S.U.; Islam, M.A.; Ahad, D.M.A.; Tanvir, M.S. Cyber Security System Using Fuzzy Logic. In Proceedings of the 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19–21 July 2023; pp. 1–6. [Google Scholar]
  2. Johanyák, Z.C. Fuzzy rule base identification using an incremental approach. GRADUS 2021, 8, 129–136. [Google Scholar] [CrossRef]
  3. Murinová, P.; Pavliska, V.; Burda, M. Fuzzy association rules on data with undefined values. In Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications: 17th International Conference, IPMU 2018, Cádiz, Spain, 11–15 June 2018; Proceedings, Part III 17. Springer: Berlin/Heidelberg, Germany, 2018; pp. 165–174. [Google Scholar]
  4. Ruiz, M.D.; Gómez-Romero, J.; Martin-Bautista, M.J.; Vila, M.A.; Delgado, M. Fuzzy meta-association rules. In Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), Gijón, Spain, 30 June 2015; pp. 247–254. [Google Scholar]
  5. Li, C. Computational issue of fuzzy rule-based system. Int. J. Comput. Sci. Netw. Secur. 2006, 6, 21–30. [Google Scholar]
  6. Kóczy, L.; Hirota, K. Approximate reasoning by linear rule interpolation and general approximation. Int. J. Approx. Reason. 1993, 9, 197–225. [Google Scholar] [CrossRef]
  7. Vass, G.; Kalmár, L.; Kóczy, L. Extension of the fuzzy rule interpolation method. Proc. Int. Conf. Fuzzy Sets Theory Appl. 1992, 1–6. [Google Scholar]
  8. Tikk, D.; Joó, I.; Kóczy, L.; Várlaki, P.; Moser, B.; Gedeon, T.D. Stability of interpolative fuzzy KH controllers. Fuzzy Sets Syst. 2002, 125, 105–119. [Google Scholar] [CrossRef]
  9. Li, Y.M.; Huang, D.M.; Zhang, L.N. Weighted fuzzy interpolative reasoning method. In Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 18–21 August 2005; Volume 5, pp. 3104–3108. [Google Scholar]
  10. Marsala, C.; Bouchon-Meunier, B. Interpolative reasoning with multi-variable rules. In Proceedings of the Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569), Vancouver, BC, Canada, 25–28 July 2001; Volume 4, pp. 2476–2481. [Google Scholar]
  11. Chang, Y.C.; Chen, S.M.; Liau, C.J. Fuzzy interpolative reasoning for sparse fuzzy-rule-based systems based on the areas of fuzzy sets. IEEE Trans. Fuzzy Syst. 2008, 16, 1285–1301. [Google Scholar] [CrossRef]
  12. Alzubi, M.; Almseidin, M.; Alkasassbeh, M.; Al-Sawwa, J.; Aldweesh, A. Comparative Analysis of Fuzzy Rule Interpolation Techniques Across Various Scenarios Using a set of Benchmarks. IEEE Access 2024, 12, 33140–33153. [Google Scholar] [CrossRef]
  13. Huang, Z.; Shen, Q. Fuzzy interpolative reasoning via scale and move transformations. IEEE Trans. Fuzzy Syst. 2006, 14, 340–359. [Google Scholar] [CrossRef]
  14. Zhou, M.; Shang, C.; Zhang, P.; Li, G.; Jin, S.; Peng, J.; Shen, Q. Towards Rule-ranking Based Fuzzy Rule Interpolation. In Proceedings of the 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Luxembourg, 11–14 July 2021; pp. 1–7. [Google Scholar]
  15. Li, F.; Shang, C.; Li, Y.; Yang, J.; Shen, Q. Fuzzy rule based interpolative reasoning supported by attribute ranking. IEEE Trans. Fuzzy Syst. 2018, 26, 2758–2773. [Google Scholar] [CrossRef]
  16. Chen, S.M.; Chen, Z.J. Weighted fuzzy interpolative reasoning for sparse fuzzy rule-based systems based on piecewise fuzzy entropies of fuzzy sets. Inf. Sci. 2016, 329, 503–523. [Google Scholar] [CrossRef]
  17. Zhou, M.; Shang, C.; Li, G.; Jin, S.; Peng, J.; Shen, Q. Fuzzy Rule Interpolation with a Transformed Rule Base. In Proceedings of the 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Luxembourg, 11–14 July 2021; pp. 1–7. [Google Scholar]
  18. Jiang, C.; Jin, S.; Shang, C.; Shen, Q. Towards utilization of rule base structure to support fuzzy rule interpolation. Expert Syst. 2023, 40, e13097. [Google Scholar] [CrossRef]
  19. Lin, J.; Shang, C.; Shen, Q. Towards Dynamic Fuzzy Rule Interpolation via Density-Based Rule Promotion from Interpolated Outcomes. Mathematics 2024, 12, 402. [Google Scholar] [CrossRef]
  20. Chen, T.; Shang, C.; Yang, J.; Li, F.; Shen, Q. A new approach for transformation-based fuzzy rule interpolation. IEEE Trans. Fuzzy Syst. 2019, 28, 3330–3344. [Google Scholar] [CrossRef]
  21. Tan, Y.; Li, J.; Wonders, M.; Chao, F.; Shum, H.P.; Yang, L. Towards sparse rule base generation for fuzzy rule interpolation. In Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (Fuzz-IEEE), Vancouver, BC, Canada, 24–29 July 2016; pp. 110–117. [Google Scholar]
  22. Alzubi, M.; Almseidin, M.; Kovacs, S.; Al-Sawwa, J.; Alkasassbeh, M. EI-FRI: Extended Incircle Fuzzy Rule Interpolation for Multidimensional Antecedents, Multiple Fuzzy Rules, and Extrapolation Using Total Weight Measurement and Shift Ratio. J. Robot. Control. 2024, 5, 217–227. [Google Scholar] [CrossRef]
  23. Alzubi, M.; Kovacs, S. Some considerations and a benchmark related to the cnf property of the koczy-hirota fuzzy rule interpolation. arXiv 2019, arXiv:1911.05041. [Google Scholar] [CrossRef]
  24. Zhou, W.J.; Maskell, D.L.; Quek, C. Fuzzy interpolation and extrapolation using shift ratio and overall weight measurement based on areas of fuzzy sets. In Proceedings of the 2013 13th UK Workshop on Computational Intelligence (UKCI), Guildford, UK, 9–11 September 2013; pp. 46–53. [Google Scholar]
  25. Chen, S.M.; Ko, Y.K. Fuzzy interpolative reasoning for sparse fuzzy rule-based systems based on alpha-cuts and transformations techniques. IEEE Trans. Fuzzy Syst. 2008, 16, 1626–1648. [Google Scholar] [CrossRef]
  26. Chang, Y.C.; Chen, S.M.; Liau, C.J. A new fuzzy interpolative reasoning method based on the areas of fuzzy sets. In Proceedings of the 2007 IEEE International Conference on Systems, Man and Cybernetics, Montreal, QC, Canada, 7–10 October 2007; pp. 320–325. [Google Scholar]
  27. Li, F.; Shang, C.; Li, Y.; Yang, J.; Shen, Q. Approximate reasoning with fuzzy rule interpolation: Background and recent advances. Artif. Intell. Rev. 2021, 54, 4543–4590. [Google Scholar] [CrossRef]
  28. Almseidin, M.; Alkasassbeh, M.; Alzubi, M.; Al-Sawwa, J. Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation. Cryptography 2022, 6, 24. [Google Scholar] [CrossRef]
  29. Chen, S.M.; Cheng, S.H.; Chen, Z.J. Fuzzy interpolative reasoning based on the ratio of fuzziness of rough-fuzzy sets. Inf. Sci. 2015, 299, 394–411. [Google Scholar] [CrossRef]
  30. Huang, D.M.; Tsang, E.; Yeung, D. A fuzzy interpolative reasoning method. In Proceedings of the 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826), Shanghai, China, 26–29 August 2004; Volume 3, pp. 1826–1830. [Google Scholar]
  31. Hsiao, W.H.; Chen, S.M.; Lee, C.H. A new interpolative reasoning method in sparse rule-based systems. Fuzzy Sets Syst. 1998, 93, 17–22. [Google Scholar] [CrossRef]
  32. Tan, C.L. Phishing dataset for machine learning: Feature evaluation. Mendeley Data 2018, 1, 2018. [Google Scholar]
  33. Chiew, K.L.; Tan, C.L.; Wong, K.; Yong, K.S.; Tiong, W.K. A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf. Sci. 2019, 484, 153–166. [Google Scholar] [CrossRef]
  34. He, M.; Horng, S.J.; Fan, P.; Khan, M.K.; Run, R.S.; Lai, J.L.; Chen, R.J.; Sutanto, A. An efficient phishing webpage detector. Expert Syst. Appl. 2011, 38, 12018–12027. [Google Scholar] [CrossRef]
  35. Guillaume, S.; Charnomordic, B. Learning interpretable Fuzzy Inference Systems with FisPro. Int. J. Inf. Sci. 2011, 181, 4409–4427. [Google Scholar] [CrossRef]
Figure 1. The triangular membership function.
Figure 1. The triangular membership function.
Computers 13 00291 g001
Figure 2. The interpolation conditions extraction procedure based on the factor parameters.
Figure 2. The interpolation conditions extraction procedure based on the factor parameters.
Computers 13 00291 g002
Figure 3. The general architecture of the proposed threefold approach.
Figure 3. The general architecture of the proposed threefold approach.
Computers 13 00291 g003
Figure 4. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (1).
Figure 4. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (1).
Computers 13 00291 g004
Figure 5. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (2).
Figure 5. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (2).
Computers 13 00291 g005
Figure 6. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (3).
Figure 6. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (3).
Computers 13 00291 g006
Figure 7. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (4).
Figure 7. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (4).
Computers 13 00291 g007
Figure 8. The results of the threefold approach in the case of missing fuzzy rules (part 1).
Figure 8. The results of the threefold approach in the case of missing fuzzy rules (part 1).
Computers 13 00291 g008
Figure 9. The results of the threefold approach in the case of missing fuzzy rules (part 2).
Figure 9. The results of the threefold approach in the case of missing fuzzy rules (part 2).
Computers 13 00291 g009
Figure 10. The performance metrics of suggested threefold approach for the phishing attack dataset.
Figure 10. The performance metrics of suggested threefold approach for the phishing attack dataset.
Computers 13 00291 g010
Table 1. Summary of previous related works.
Table 1. Summary of previous related works.
ReferenceMethodContributionsEvaluation Procedure
[6]KH MethodLinear interpolation, adaptation of similarity concept, multi-dimensional variable spaceBenchmark metrics
 [7]Enhanced KH MethodModification based on alpha-cut values, address abnormal resultsBenchmark metrics
[8]KH-Stabilized MethodOvercoming abnormality conclusions, weighted distance adaptationBenchmark metrics
[10]Extension of Linear ReasoningAnalogical technique, addressing issues related to existing fuzzy rulesBenchmark metrics
[9]Weighted Fuzzy Interpolative ReasoningAdaptation of the center of gravity, interpolation for trapezoidal fuzzy setsBenchmark metrics
 [11]Area-Adaptive InterpolationAdaptation of fuzzy set area, convexity, and normality in resultsBenchmark metrics
 [16]Weighted Fuzzy RulesPiecewise fuzzy entropies, characterization of interpolation points, extraction of piecewise valuesExperimental datasets
 [14]Feature Ranking for FRIInterpolation based on feature selection algorithm, handling cases of missing fuzzy rulesExperimental datasets
 [15]FRI with Feature Selection AlgorithmsEmployed feature selection techniques (IG, RF, LS, LLCFS)Experimental datasets
[13]Scale and Move MethodHandling various fuzzy set shapes, nearest two existing fuzzy rules, normality and convexity in resultsBenchmark metrics
 [17]Mahalanobis Distance in FRIAdaptation of Mahalanobis distance matrix, transformation of sparse rule baseBenchmark metrics
 [18]Isomorphic Data Space FRITransformation of fuzzy rules space, reduction of generated fuzzy rulesExperimental datasets
[20]Random Subset FRISelection of a random subset of sparse fuzzy rules with a weighting factor, handling missing fuzzy rulesExperimental datasets
 [21]Sparse Fuzzy Rule GenerationIdentification and optimization of important fuzzy rules for sparse regionsExperimental datasets
 [22]Enhancement of incircle FRI methodModify the weights, use the shift techniqueBenchmark metrics
 [19]Dynamic FRI methodIntegrated the OPTICS clusteringExperimental datasets
Table 2. Characteristics of the applied FRI benchmark metrics.
Table 2. Characteristics of the applied FRI benchmark metrics.
Benchmark MetricAntecedent PartConsequent PartShape
Metric 1A1 = [0 5 4 ], A2 = [11 13 14],
A o b s e r v a t i o n = [7 8 9 ]
B1 = [0 2 4 ], B2 = [10 11 13]Triangular, triangular
Metric 2A1 = [0 5 6], A2 = [11 13 14],
A o b s e r v a t i o n = [8 8 8]
B1 = [0 2 4 ], B2 = [10 11 13]Triangular, singleton
Metric 3A1 = [3 3 3 ], A2 = [11 13 14],
A o b s e r v a t i o n = [5 7 9 ]
B1 = [4 4 4 ], B2 = [10 11.5 13]Mixed: singleton, triangular
Metric 4A1 = [0 4 5 6 ], A2 = [11 12 13 14],
A o b s e r v a t i o n = [6 6 9 10]
B1 = [0 2 3 4], B2 = [10 11 12 13]Trapezoidal
Table 3. Summary of archived results generated using the FRI benchmark metrics.
Table 3. Summary of archived results generated using the FRI benchmark metrics.
ObservationCondition (Rule1)Condition (Rule2)Factor.R1Factor.R2Output
Metric 1[3.11 5.77 6.7778][8.77 10.22 11.22]0.44440.5556[0 1.11 2.22]
Metric 2[3.00 6.13 6.75][9.33 10.22 10.66]0.37500.6250[0.00 1.25 2.50]
Metric 3[3.8 4.6 5.4][7.66 9.66 11.22]0.40.6[2.4 2.4 2.4]
Metric 4[2.25 4.75 6.5 7.5][7.875 8.25 10.50 11.5]0.37500.6250[0 1.25 1.875 2.5]
Table 4. Comparison with Related FRI Methods.
Table 4. Comparison with Related FRI Methods.
Benchmark MetricFRI MethodReferenceInterpolated Result
Benchmark Metric 1 and Benchmark Metric 2
Benchmark Metric 3 and Benchmark Metric 4
KH FRI[6]Metric (1) = [6.36 5.38 7.38]
Metric (2) = [7.27 5.38 6.25]
Metric (3) = [5.33 6.33 9.00]
Metric (4) = [5.45 4.25 7.5 7.4]
KHstab FRI[8]Metric (1) = [7.27 5.38 6.25]
Metric (2) = [7.27 5.38 6.25]
Metric (3) = [5.33 6.33 9.00]
Metric (4) = [5.45 4.25 7.5 7.4]
VKK FRI[7]Metric (1) = [6.15 5.38 7.84]
Metric (2) = [7.00 5.38 7.00]
Metric (3) = [—]
Metric (4) = [5.3 4.4 7.4 7.7]
CCL FRI[11]Metric (1) = [4.94 5.38 7.38]
Metric (2) = [5.38 5.38 5.38]
Metric (3) = [5.33 6.33 8.33]
Metric (4) = [4.25 4.25 7.5 8.5]
HS FRI[13]Metric (1) = [5.83 6.26 7.38]
Metric (2) = [6.49 6.49 6.49]
Metric (3) = [5.71 6.28 8.16]
Metric (4) = [5.23 5.23 7.61 8.5]
HTY FRI[30]Metric (1) = [5.76 6.42 7.30]
Metric (2) = [6.49 6.49 6.49]
Metric (3) = [—]
Metric (4) = [4.98 7.44 6.44 8.06]
HCL FRI[31]Metric (1) = [6.36 6.58 7.38]
Metric (2) = [7.27 — 6.25]
Metric (3) = [5.33 6.55 9.00]
Metric (4) = [—]
Threefold Approach Metric (1) = [0 1.11 2.22]
Metric (2) = [0 1.25 2.50]
Metric (3) = [2.40 2.40 2.40]
Metric (4) = [0 1.25 1.87 2.50]
Note: The symbol (—) denotes that the FRI method failed to generate the required results.
Table 5. The top five features of the phishing attack dataset.
Table 5. The top five features of the phishing attack dataset.
IndexThe Top 5 Features of Phishing Attack DatasetLinguistic Terms
1PctExtHyperlinksL, M, H
2PctExtResourceUrlsL, M, H
3NumNumericCharsL, M, H
4PctExtNullSelfRedirectHyperlinksRTL, M, H
5PctNullSelfRedirectHyperlinksL, M, H
L = low, M = medium, H = high.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Almseidin, M.; Alzubi, M.; Al-Sawwa, J.; Alkasassbeh, M.; Alfraheed, M. A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases. Computers 2024, 13, 291. https://doi.org/10.3390/computers13110291

AMA Style

Almseidin M, Alzubi M, Al-Sawwa J, Alkasassbeh M, Alfraheed M. A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases. Computers. 2024; 13(11):291. https://doi.org/10.3390/computers13110291

Chicago/Turabian Style

Almseidin, Mohammad, Maen Alzubi, Jamil Al-Sawwa, Mouhammd Alkasassbeh, and Mohammad Alfraheed. 2024. "A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases" Computers 13, no. 11: 291. https://doi.org/10.3390/computers13110291

APA Style

Almseidin, M., Alzubi, M., Al-Sawwa, J., Alkasassbeh, M., & Alfraheed, M. (2024). A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases. Computers, 13(11), 291. https://doi.org/10.3390/computers13110291

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop