Enhanced Phishing Website Categorization Using Random Forest with Sea Horse and Jellyfish Search Optimization
Abstract
In contemporary society, with advancements in science and technology, many global activities, ranging from financial transactions to information transfers, are conducted through the Internet via dedicated websites and applications. Unfortunately, the prevalence of online platforms has increased the proliferation of fake websites aimed at exploiting sensitive data, such as bank card information and personal details. It addresses the problem of cybersecurity w.r.t. the categorization of a set of 1353 websites by a machine learning algorithm into three categories, namely phishing, suspicious, and legitimate URLs. The dataset was gathered from published papers and divided into 70-30 in the training and testing phases. This will help keep members' banking and personal data much safer online. This paper uses the RFC model with two optimization schemes, Sea Horse Optimizer (SHO) and Jellyfish Search Optimization Algorithm (JSOA), to improve performance. After that, optimized versions of the schemes are tagged as RFSH and RFJS, respectively. After extensive training and testing on these three schemes, the best model was identified by comparing the performances of the three on the database in hand. The RFSH model performed better predicting, achieving 0.952 for all the data. It outperformed the RFJS model with a precision of 0.932 and the RFC single framework with an accuracy of 0.9106. Hence, it emerged as the best-predicting model.DOI:
https://doi.org/10.31449/inf.v49i10.8089Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







