You are currently viewing a new version of our website. To view the old version click .
Computers
  • Article
  • Open Access

8 November 2024

A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases

,
,
,
and
1
Computer Science Department, Tafila Technical University, Tafila 66110, Jordan
2
Department of Robotics and Artificial Intelligence, Jadara University, Irbid 21110, Jordan
3
Computer Science Department, Princess Sumaya University for Technology, Amman 11195, Jordan
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Multimedia Data and Network Security

Abstract

Fuzzy systems are powerful modeling systems for uncertainty applications. In contrast to traditional crisp systems, fuzzy systems offer the opportunity to extend the binary decision to continuous space, which could offer benefits for various application areas such as intrusion detection systems (IDSs), because of their ability to measure the degree of attacks instead of making a binary decision. Furthermore, fuzzy systems offer a suitable environment that is able to deal with uncertainty. However, fuzzy systems face a critical challenge represented by the sparse fuzzy rules. Typical fuzzy systems demand complete fuzzy rules in order to offer the required results. Additionally, generating complete fuzzy rules can be difficult due to many factors, such as a lack of knowledge base or limited data availability, such as in IDS applications. Fuzzy rule interpolation (FRI) was introduced to overcome this limitation by generating the required interpolation results in cases with sparse fuzzy rules. This work introduces a threefold approach designed to address the cases of missing fuzzy rules, which uses a few fuzzy rules to handle the limitations of missing fuzzy rules. This is achieved by finding the interpolation condition of neighboring fuzzy rules. This procedure was accomplished based on the concept of factors (which determine the degree to which each neighboring fuzzy rule contributes to the interpolated results, in cases of missing fuzzy rules). The evaluation procedure for the threefold approach was conducted using the following two steps: firstly, using the FRI benchmark numerical metrics, the results demonstrated the ability of the threefold approach to generate the required results for the various benchmark scenarios. Secondly, using a real-life dataset (phishing attacks dataset), the results demonstrated the effectiveness of the suggested approach to handle cases of missing fuzzy rules in the area of phishing attacks. Consequently, the suggested threefold approach offers an opportunity to reduce the number of fuzzy rules effectively and generate the required results using only a few fuzzy rules.

1. Introduction

The rapid growth of dynamic and uncertain environments enabled the widespread use of fuzzy systems. The strengths of the fuzzy systems make them a suitable framework to address cases of uncertainty. Fuzzy systems effectively cooperate with expert knowledge, which is integrated as an important factor for the inference engine. This integration of expert knowledge produces an understandable rule-based system. Adapting the fuzzy systems in this way helps to address the issues of binary decisions. For instance, in the intrusion detection application area, the binary decision is considered a serious challenge [1]. This is due to there being no clear boundaries between normal and abnormal traffic. Therefore, the fuzzy system could be a suitable detection approach that offers an acceptable extension of the binary decision to the continuous space.
However, effectively modeling a fuzzy system faces a critical challenge, characterized by the issue of sparse fuzzy rules. The typical inference methods, such as those of Mamdani and Takagi-Suegno, required complete fuzzy rules for the modeling of fuzzy systems. In other words, the inference of a fuzzy system, which is considered a critical step, could not be initiated in the case of sparse fuzzy rules [2]. In a sparse fuzzy rules scenario, the typical classical reasoning methods could not infer the required result from the new observation. There are several reasons for the case of sparse fuzzy rules or missing fuzzy rules [3,4,5]. These reasons can be summarized as follows:
  • Limited data could lead to sparse fuzzy rule scenarios, as limited data cannot be used to build complete fuzzy rules that can cover all possible observation scenarios.
  • In the case of a dynamic environment, the appearance of dynamic changes in input variables not previously investigated could lead to sparse fuzzy rules. Therefore, the shift to a dynamic environment could create a lack of knowledge. In this case, the system cannot generate the required results for all possible observations due to the dynamic changes in variables in the environment.
  • In a complex system, there could be a lack of knowledge, thereby causing sparse fuzzy rules to be built. Some complex systems, such as intrusion detection, face the serious challenge of a lack of knowledge. Therefore, generating complete fuzzy rules could be a serious challenge. From another perspective, the existence of inadequate fuzzy rules would also cause a sparse region into which new observations may fall.
The cases of limited data availability and a lack of knowledge reflect the true nature of real-world application problems, as many application areas face these essential issues. One such domain that suffers from limited data availability and the lack of a knowledge base is phishing attacks detection and botnet attacks detection. Limited data availability and the lack of a knowledge base play a major role in limiting the fuzzy systems for these applications, due to their need for complete fuzzy rules. Therefore, in response to these critical issues, this paper introduces a novel FRI method, entitled the threefold approach. The threefold approach aims to handle the limitations of fuzzy systems in the case of sparse fuzzy rules. This benefit enables the threefold approach to be used as an inference engine in cases of limited data availability and a lack of knowledge, as found in phishing attack detection. Moreover, the threefold approach could offer an opportunity for the fuzzy system to generate the required results with missing fuzzy rules, as well as the opportunity to extend the binary decision to the continuous space. Furthermore, the suggested threefold approach could be beneficial in reducing the complexity of fuzzy systems by generating the required results using only a few fuzzy rules.
The suggested threefold approach interpolates the required results in the case of missing fuzzy rules by extracting the interpolation conditions of the new input and the existing fuzzy rules. This technique is introduced according to the factor concept. The factor concept is used to determine the degree to which each neighboring fuzzy rule contributes to the interpolated results, in the case of missing fuzzy rules. Consequently, the proposed threefold approach could be a beneficial fuzzy approach to implement in areas and applications where there is a lack of knowledge and limited data availability, such as phishing attack detection. In this paper, we break down the main contributions as follows:
  • The development of a threefold approach by introducing a systematic three-step method to address the limitations of sparse fuzzy rules in fuzzy systems, which can make it challenging to generate the required results or conclusions.
  • Introducing the factor concept, which determines the degree of participation of each neighboring fuzzy rule in handling the issue of sparse/missing fuzzy rules.
  • Evaluating the suggested method using various FRI benchmark numerical metrics, the results of which demonstrate its ability to successfully handle various benchmark scenarios involving incomplete fuzzy rule sets.
  • Evaluating the suggested method using an open-source real life phishing attacks dataset, the results of which demonstrated the ability of the suggested approach to handle cases of limited data availability and a lack of knowledge.
This paper is organized as follows: Section 2 presents related works on fuzzy rule interpolation and provides a brief overview of the studied FRI methods, including some advantages and limitations. Section 3 introduces the suggested threefold approach, including the main steps used to interpolate the required results in the case of missing fuzzy rules. This is followed by the experiments and results, which are set out in Section 4. Section 5 concludes the paper.

3. The Proposed Threefold Approach

This section introduces in detail the suggested threefold approach along with its main requirements and steps for implementation. Typically, in fuzzy systems, the triangular membership functions are widely used, due to their simplicity [23]. The triangular membership function can be described as ( A 1 , B 1 , C 1 ), where A 1 represents the left side, B 1 represents the height, and C 1 represents the right side. Figure 1 presents the triangular membership function.
Figure 1. The triangular membership function.
For simplicity, in the preliminary stage of the suggested reasoning method, the two fuzzy rules A 1 B 1 and A 2 B 2 adjacent to the new observation are considered from the rule base, where A1, A2, B1, and B2 illustrate the fuzzy sets of the antecedents and consequent parts, respectively.
The first essential step of the threefold approach is to determine the distance between the current fuzzy rules and the new observation. The distance between the current fuzzy rules and the new observation can be determined as follows:
Distance ( A i , A ) = j = 1 n ( A i [ j ] A [ j ] ) 2
The existing fuzzy rules are represented by A j and the new observation is represented by A . Figure 2 illustrates the distance between fuzzy rule A i and observation A . After the distance between the current fuzzy rules and the new observation is calculated, the next step is to define the interpolation conditions of the neighboring fuzzy rules.
Figure 2. The interpolation conditions extraction procedure based on the factor parameters.
The interpolation conditions in the threefold approach can be defined as follows:
Condition ( R u l e i j ) = A i j [ 1 ] + Factor . R i j × ( A i [ 1 ] A i j [ 1 ] ) A i j [ 2 ] + Factor . R i j × ( A i [ 2 ] A i j [ 2 ] ) A i j [ k ] + Factor . R i j × ( A i [ k ] A i j [ k ] )
where i = 1 , 2 , , n refers to the number of inputs and j = 1 , 2 , , m refers to the number of fuzzy sets. It is worth mentioning that the derived interpolation condition in the threefold approach is based on the concept of factors. The Factor . R i j is used to determine the degree to which each neighboring fuzzy rule contributes to the interpolated results in cases of missing fuzzy rules. Factor . R i j can be calculated as the ratio distance between the new observation and the neighboring fuzzy rules, as follows:
Factor . R i j = Distance ( A i , A i j ) Total Distance ( A i j , A i ( j + 1 ) )
The aim behind using the factor parameter is to offer a balanced mechanism in the interpolation results. More precisely, each neighboring fuzzy rule has a factor parameter, which measures the effectiveness of each neighboring fuzzy rule for the new observation. This benefit allows the threefold approach to adjust the weights of the neighboring fuzzy rules dynamically.
It is worth mentioning that the previous factor parameter calculation scenario was based on the condition that the new observation’s position was between two adjacent fuzzy rules. However, in the case of the new observation’s position, if it is outside (extrapolation) two adjacent fuzzy rules, then the Factor . R i j can be calculated as follows:
F a c t o r . R i = D i s t a n c e ( A , A i ) T o t a l D i s t a n c e ( A i , A i + 1 ) r o u n d D i s t a n c e ( A , A i ) T o t a l D i s t a n c e ( A i , A i + 1 )
Regarding the factor parameter, for instance, if there are three fuzzy rules, for example ( A 1 B 1 ) , ( A 2 B 2 ) , and ( A 3 B 3 ) , each rule has its own factor value, as follows:
  • Factor.R1 corresponds to Rule 1 ( ( A 1 B 1 ) );
  • Factor.R2 corresponds to Rule 2 ( ( A 2 B 2 ) );
  • Factor.R3 corresponds to Rule 3 ( ( A 3 B 3 ) ).
The factor parameters offer the required balance for the interpolation of the required results by determining the degree to which neighboring fuzzy rule contributes to the interpolated results in cases with missing fuzzy rules. Subsequently, the final step of the threefold approach is to generate the required outputs for the new observation, which are not covered by any of the fuzzy rules. The final output for the new observation is defined as follows:
O u t p u t ( R u l e i ) = [ B i 1 + F a c t o r . R i × ( C o n d i t i o n ( R u l e i ) B i 1 ) , B i 2 + F a c t o r . R i × ( C o n d i t i o n ( R u l e i ) B i 2 ) , B i 3 + F a c t o r . R i × ( C o n d i t i o n ( R u l e i ) B i 3 ) ]
Algorithm 1 summarizes the main steps of the threefold approach for interpolating the output for the new observation A , in the case of a single-antecedent part. The general architecture of the proposed threefold approach is shown in Figure 3.
Algorithm 1 Threefold approach algorithm for single-antecedent part with two fuzzy rules
  • Require: Fuzzy rule parameters: A 1 , A 2 , B 1 , B 2 , Observation: A
    • The attribute values of the fuzzy sets: A 1 = [ a 11 , a 12 , a 13 ] , A 2 = [ a 21 , a 22 , a 23 ] , B 1 = [ b 11 , b 12 , b 13 ] , B 2 = [ b 21 , b 22 , b 23 ] , A = [ a 11 , a 12 , a 13 ] , B = [ b 11 , b 12 , b 13 ] .
  • Ensure: Fuzzy rule outputs: B Rule 1 , B Rule 2
     
    2:
    Phase 1: Calculating the distance between the new observation and the existing fuzzy rules
    3:
    Dis( A , A 1 ) = | a 12 a 12 | .
    4:
    Dis( A , A 2 ) = | a 22 a 12 | .
    5:
    Dis( A 1 , A 2 ) = | a 22 a 12 | .
     
    6:
    Phase 2: Determining the interpolation conditions based on factor concept
    7:
    Condition( R u l e 1 ) = [( a 11 + Factor. R 1 × ( a 1 a 11 )),( a 12 + Factor. R 1 × ( a 2 a 12 )), ( a 13 + Factor. R 1 × ( a 3 a 13 ))]
    8:
    Condition( R u l e 2 ) = [( a 21 + Factor. R 2 × ( a 1 a 21 )),( a 22 + Factor. R 2 × ( a 2 a 22 )), ( a 23 + Factor. R 2 × ( a 3 a 23 ))]
     
    9:
    The factor concept could measured based on two scenarios:
    1. In case the observation hits between two adjacent fuzzy rules ( A 1 B 1 and A 2 B 2 ), then, the Factor. R 1 and Factor. R 2 are as follows:
     
    10:
    if  a 2 a 12 and a 2 a 22  then
    11:
        Factor.R1 = (Dis( A , A 1 ) / Dis( A 1 , A 2 ) )
    12:
        Factor.R2 = (Dis( A , A 2 ) / Dis( A 1 , A 2 ) )
    13:
    end if
    2. In case the observation is extrapolation (outside range) adjacent fuzzy rules ( A 1 B 1 and A 2 B 2 ), then, the Factor.R1 and Factor.R2 is as follows:
     
    14:
    if  a 2 a 12 and a 2 a 22  then
    15:
        Dis. R 1 = (Dis( A , A 1 ) / Dis( A 1 , A 2 ) )
    16:
        Factor. R 1 = | Dis. R 1 − round(Dis. R 1 ) |
    17:
        Dis. R 2 = (Dis( A , A 2 ) / Dis( A 1 , A 2 ) )
    18:
        Factor. R 2 = | Dis. R 2 − round(Dis. R 2 ) |
    19:
    end if
    20:
     
     
    21:
    Phase 3: The interpolated results are computed as follows:
    22:
    Output( R u l e 1 ) = [( b 11 + Factor. R 1 × (Condition( R u l e 1 ) – b 11 )),( b 12 + Factor. R 1 × (Condition( R u l e 1 ) – b 12 )),( b 13 + Factor. R 1 × (Condition( R u l e 1 ) – b 13 ))]
    23:
    Output( R u l e 2 ) = [( b 21 + Factor. R 2 × (Condition( R u l e 2 ) – b 21 )),( b 22 + Factor. R i × (Condition( R u l e 2 ) – b 22 )),( b 23 + Factor. R 2 × (Condition( R u l e 2 ) – b 23 ))]
Figure 3. The general architecture of the proposed threefold approach.

4. Experiments and Results

This section presents the evaluation procedure for the suggested threefold approach for cases with missing fuzzy rules and a lack of knowledge base. Fortunately, there are FRI benchmark metrics that have been introduced in [11,13,24,25,26,27], which can be used to evaluate the effectiveness of the suggested FRI method when interpolating the required results in various scenarios. Although FRI benchmark metrics provide an initial demonstration of the effectiveness of the suggested FRI method, evaluating the suggested FRI method based on a benchmark dataset offers an opportunity to evaluate its effectiveness in terms of practical applications. Therefore, the evaluation procedure of the suggested threefold approach was undertaken using the following two steps. Firstly, the FRI benchmark metrics were used to evaluate the effectiveness of FRI methods in various scenarios. Secondly, the proposed threefold approach was evaluated based on a real-life benchmark dataset (a phishing dataset). The reason behind using the phishing attacks dataset is because it is a suitable application area with limited data availability and a lack of knowledge base [28]; thus, it is a suitable environment in which to apply the FRI evaluation methods. The characteristics of the applied FRI benchmark metrics are presented in Table 2.
Table 2. Characteristics of the applied FRI benchmark metrics.
Benchmark metric 1 aimed to evaluate the effectiveness of the suggested threefold approach to interpolate the required results in cases of triangular fuzzy sets that represent all parts of a fuzzy system. Various FRI methods can be evaluated according to benchmark metric (1), as in [29]. The proposed threefold approach generates a meaningful conclusion to handle the scenario when evaluated using FRI benchmark metric (1). Precisely, the conclusion of the threefold approach was derived as follows: the new conditions between the antecedents and the new observation fuzzy sets (Condition( Rule i )) were calculated using Equation (2), generating Condition(Rule1) = [3.11, 5.77, 6.7778] and Condition(Rule2) = [8.77, 10.22, 11.22]. Using Equations (3) and (4), the factor variables were computed as follows: Factor.R1 = 0.4444 and Factor.R2 = 0.5556. Then, the results of the factor values were used to calculate the Output( Rule i ) using Equation (5). Then, the new conditions of the output were represented as Output(Rule1) = [0, 1.11, 2.22] and Output(Rule2) = [4.44, 4.88, 5.77]. Finally, based on the factor values, the minimum value was selected, which was close to the observation. Therefore, the final result of this benchmark metric was Output(Rule1) = [0, 1.11, 2.22], which is close to the Rule 1 shown in Figure 4.
Figure 4. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (1).
In terms of benchmark metric 2, this benchmark metric aimed to evaluate the effectiveness of the proposed threefold approach in a scenario where the observation appeared as a singleton fuzzy set. The suggested threefold approach was able to successfully interpolate the required fuzzy rules able to handle the issue related to benchmark metric (2). The conclusion of the threefold approach was derived as follows: the new conditions between the antecedents and the new observation fuzzy sets (Condition( Rule i )) were calculated using Equation (2), generating Condition(Rule1) = [3.00, 6.13, 6.75] and Condition(Rule2) = [9.33, 10.22, 10.66]. Using Equations (3) and (4), the factor variables were computed, resulting in Factor.R1 = 0.3750 and Factor.R2 = 0.6250. Thereafter, the results of the factor values were used to calculate the Output( Rule i ), using Equation (5). Therefore, the new conditions of the output were represented as Output(Rule1) = [0.00, 1.25, 2.50] and Output(Rule2) = [4.44, 4.88, 5.77]. Finally, based on the factor values, the minimum value was selected, which was close to the new observation. The final result of this benchmark metric was Output(Rule1) = [0.00, 1.25, 2.50], which was close to the Rule1 shown in Figure 5. The suggested threefold approach was able to interpolate the required conclusion for benchmark metric (2). With regards to [29], the suggested threefold approach was able to generate the required conclusion for this scenario of fuzzy set shapes.
Figure 5. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (2).
The suggested threefold approach successfully generated the required conclusion for the previous two benchmark metrics. However, in the case of mixed-shape fuzzy sets, where the singleton fuzzy sets illustrated the rule ( A 1 , B 1 ) and the triangular fuzzy sets illustrated the rule ( A 2 , B 2 ), the new observation appeared as a triangular fuzzy set. This case reflected benchmark metric 3.
The suggested threefold approach was able to handle the scenario of FRI benchmark metric (3) as the new condition between the antecedents and the observation fuzzy sets (Condition( Rule i )), which was calculated using Equation (2) and generated Condition(Rule1) = [3.8, 4.6, 5.4] and Condition(Rule2) = [7.66, 9.66, 11.22]. Using Equations (3) and (4), the factor variables were computed, which totaled Factor.R1 = 0.4 and Factor.R2 = 0.6. Then, the results of the factor values were used to calculate the Output( Rule i ), using Equation (5). Subsequently, the new conditions of the output were Output(Rule1) = [2.4, 2.4, 2.4] and Output(Rule2) = [4.44, 5.11, 5.77]. Finally, based on the factor values, the minimum value was selected, which was close to the new observation. Therefore, the final result of this benchmark metric was Output(Rule1) = [2.4, 2.4, 2.4], which was close to the Rule1 shown in Figure 6.
Figure 6. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (3).
Benchmark metric 4 aimed to evaluate the effectiveness of the suggested threefold approach when using a trapezoidal fuzzy set. The threefold approach effectively generated the required fuzzy rules that could handle the new observation that appeared in the sparse region. The suggested threefold approach also derived the required conclusion for this benchmark metric through the calculation of new conditions between the antecedents and the observation fuzzy sets (Condition( Rule i )), using Equation (2), which were Condition(Rule1) = [2.25, 4.75, 6.5, 7.5], and Condition(Rule2) = [7.875, 8.25, 10.50, 11.5]. Using Equations (3) and (4), the factor variables were computed as Factor.R1 = 0.3750 and Factor.R2 = 0.6250. Then, the results of the factor values were used to calculate the Output ( Rule i ), using Equation (5). Subsequently, the new conditions of the output were Output(Rule1) = [0, 1.25, 1.875, 2.5] and Output(Rule2) = [3.75, 4.125, 4.5, 4.875]. Finally, based on the factor values, the minimum value was close to the new observation. Therefore, the final result of this benchmark metric was Output(Rule1) = [0, 1.25, 1.875, 2.5], which was close to the Rule1 shown in Figure 7. Table 3 summarizes the accomplished results, based on the studied FRI benchmark metrics. As discussed in Section 2, significant contributions were proposed to overcome the issues related to the missing fuzzy rules. We conducted a comparative analysis with other FRI methods that employed the same benchmark metrics for more in-depth analysis. Table 4 compares the results of the evaluation of the suggested threefold approach with that of other FRI methods, employing the same FRI benchmark metrics.
Figure 7. The results of the threefold approach evaluation compared to other FRI methods [22,25], based on benchmark metric (4).
Table 3. Summary of archived results generated using the FRI benchmark metrics.
Table 4. Comparison with Related FRI Methods.
To summarize the accomplished results, the suggested threefold approach was successfully evaluated using the aforementioned FRI benchmark metrics and generated the required results in cases when a sparse region appeared. For a more extensive evaluation, the next step focused on applying the suggested threefold approach to a phishing attack dataset. The domain of phishing attacks is a relevant domain that suffers from a lack of knowledge base and limited data availability. The studied phishing attack dataset was introduced by Tan et al. in [32]. It includes 10,000 instances, along with 48 features. It is worth mentioning that this number of input parameters is considered a large number of fuzzy systems. Moreover, some input parameters may not reflect the real behavior of the phishing attack. Therefore, we have extracted only the top five features that were introduced by [33,34]. In addition, the extracted top five parameters were normalized to offer more consistency for the input observations as well as to simplify the rule base, and to mitigate the effect of outliers if they existed. The extracted input parameters and their linguistic terms are presented in Table 5.
Table 5. The top five features of the phishing attack dataset.
For the sake of simplicity, the triangular fuzzy set was used to represent each input parameter. The consequent part, representing the class label, was a fuzzy singleton shape. The fuzzy singleton shape was used to present the discrete crisp output. It is important to note that no optimization technique was used for the membership function values, since the core contribution of this work is to introduce the concept of the threefold approach for interpolating the required results in cases with missing fuzzy rules. Certainly, adopting optimization techniques for the membership values and fuzzy rules could enhance the performance and effectiveness of the inference engine. The fuzzy rules and membership values were learned using a classical method in [35]. The fuzzy set parameters were generated to produce an environment that had highly sparse regions. Afterward, several observations (input parameters) that were located in the sparse region and not covered by any fuzzy rules were passed to the suggested threefold approach. The experiments conducted and the results obtained demonstrated the ability of the suggested threefold approach to generate the required results in the case of sparse regions, as shown in Figure 8 and Figure 9, respectively. Figure 10 presents the performance metrics of the suggested threefold approach based on the phishing attack dataset.
Figure 8. The results of the threefold approach in the case of missing fuzzy rules (part 1).
Figure 9. The results of the threefold approach in the case of missing fuzzy rules (part 2).
Figure 10. The performance metrics of suggested threefold approach for the phishing attack dataset.
The proposed threefold approach successfully interpolated the required results across various benchmark metrics and generated the required alerts for the case study involving the phishing attack dataset. This method could be suitable for use in other application areas that suffer from sparse fuzzy rules. Furthermore, the suggested approach was characterized by its ability to work even if there was only one neighboring fuzzy rule. In addition, the suggested threefold approach was able to generate the required interpolation results even in cases with mixed-shape fuzzy sets. Therefore, it was not restricted to a specific fuzzy set shape. Finally, the threefold approach was compatible with existing fuzzy rules. Specifically, it could produce accurate results when the new observation precisely matched one of the existing fuzzy rules.
Despite the promising results of the proposed threefold approach, the threefold approach results depended on the quality of the existing fuzzy rules. In other words, the results obtained here by the threefold approach could be unrealistic in cases involving low-quality fuzzy rules. One of the possible solutions is to adapt optimization algorithms as metaheuristic optimization algorithms. The metaheuristic optimization algorithms could be used to extract baseline fuzzy rules with high quality to be used to generate the required interpolated results. Moreover, achieving a balance between accurate interpolation results and a simple fuzzy system may not always be straightforward.

5. Conclusions

This paper introduced the threefold approach as a fuzzy rule interpolation reasoning method. The suggested threefold reasoning method aimed to handle the case of sparse regions in fuzzy systems with missing fuzzy rules. The suggested approach was initiated by computing the distance between the new observation and the current fuzzy rules. Subsequently, the fuzzy interpolation conditions were computed according to the neighboring fuzzy rules to determine the degree to which each neighboring fuzzy rule contributed to the interpolated results in cases with missing fuzzy rules. Consequently, the suggested threefold approach generated the required results using the computed interpolation conditions of each neighboring fuzzy rule. The suggested approach was characterized by its ability to work even if there was only one neighboring fuzzy rule. Moreover, it was able to work in the case of extrapolation, which could be beneficial in a dynamic environment. In addition, the suggested threefold approach was able to generate the required interpolation results even in the case of mixed-shape fuzzy sets. Therefore, it was not restricted to a specific fuzzy shape. The conducted experiments involved the following two scenarios. The first scenario used FRI benchmark metrics; the obtained results illustrated the effectiveness of the suggested approach in generating the required interpolation results for different FRI benchmark metric-based scenarios. The second scenario used a phishing attack dataset, which was considered a suitable candidate because it suffered from a lack of knowledge and limited data availability. The obtained results illustrated the effectiveness of the suggested approach in handling cases with missing fuzzy rules for the studied phishing attack dataset. Consequently, the suggested threefold approach could be a suitable reasoning method for handling cases with missing fuzzy rules as well as for reducing the complexity of fuzzy systems.
For future work, it could be worth extending the current threefold approach to handle cases involving different fuzzy set shapes. Moreover, it could be useful to adapt optimization algorithms for the extraction of high-quality base fuzzy rules, to be used later for interpolating results.

Author Contributions

Conceptualization, M.A. (Mohammad Almseidin) and M.A. (Mouhammd Alkasassbeh); methodology, M.A. (Mohammad Almseidin) and M.A (Maen Alzubi); software, M.A. (Maen Alzubi) and M.A. (Mohammad Alfraheed) and J.A.-S.; validation, M.A. (Maen Alzubi) and J.A.-S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Mynuddin, M.; Hossain, M.I.; Khan, S.U.; Islam, M.A.; Ahad, D.M.A.; Tanvir, M.S. Cyber Security System Using Fuzzy Logic. In Proceedings of the 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19–21 July 2023; pp. 1–6. [Google Scholar]
  2. Johanyák, Z.C. Fuzzy rule base identification using an incremental approach. GRADUS 2021, 8, 129–136. [Google Scholar] [CrossRef]
  3. Murinová, P.; Pavliska, V.; Burda, M. Fuzzy association rules on data with undefined values. In Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications: 17th International Conference, IPMU 2018, Cádiz, Spain, 11–15 June 2018; Proceedings, Part III 17. Springer: Berlin/Heidelberg, Germany, 2018; pp. 165–174. [Google Scholar]
  4. Ruiz, M.D.; Gómez-Romero, J.; Martin-Bautista, M.J.; Vila, M.A.; Delgado, M. Fuzzy meta-association rules. In Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), Gijón, Spain, 30 June 2015; pp. 247–254. [Google Scholar]
  5. Li, C. Computational issue of fuzzy rule-based system. Int. J. Comput. Sci. Netw. Secur. 2006, 6, 21–30. [Google Scholar]
  6. Kóczy, L.; Hirota, K. Approximate reasoning by linear rule interpolation and general approximation. Int. J. Approx. Reason. 1993, 9, 197–225. [Google Scholar] [CrossRef]
  7. Vass, G.; Kalmár, L.; Kóczy, L. Extension of the fuzzy rule interpolation method. Proc. Int. Conf. Fuzzy Sets Theory Appl. 1992, 1–6. [Google Scholar]
  8. Tikk, D.; Joó, I.; Kóczy, L.; Várlaki, P.; Moser, B.; Gedeon, T.D. Stability of interpolative fuzzy KH controllers. Fuzzy Sets Syst. 2002, 125, 105–119. [Google Scholar] [CrossRef]
  9. Li, Y.M.; Huang, D.M.; Zhang, L.N. Weighted fuzzy interpolative reasoning method. In Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 18–21 August 2005; Volume 5, pp. 3104–3108. [Google Scholar]
  10. Marsala, C.; Bouchon-Meunier, B. Interpolative reasoning with multi-variable rules. In Proceedings of the Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569), Vancouver, BC, Canada, 25–28 July 2001; Volume 4, pp. 2476–2481. [Google Scholar]
  11. Chang, Y.C.; Chen, S.M.; Liau, C.J. Fuzzy interpolative reasoning for sparse fuzzy-rule-based systems based on the areas of fuzzy sets. IEEE Trans. Fuzzy Syst. 2008, 16, 1285–1301. [Google Scholar] [CrossRef]
  12. Alzubi, M.; Almseidin, M.; Alkasassbeh, M.; Al-Sawwa, J.; Aldweesh, A. Comparative Analysis of Fuzzy Rule Interpolation Techniques Across Various Scenarios Using a set of Benchmarks. IEEE Access 2024, 12, 33140–33153. [Google Scholar] [CrossRef]
  13. Huang, Z.; Shen, Q. Fuzzy interpolative reasoning via scale and move transformations. IEEE Trans. Fuzzy Syst. 2006, 14, 340–359. [Google Scholar] [CrossRef]
  14. Zhou, M.; Shang, C.; Zhang, P.; Li, G.; Jin, S.; Peng, J.; Shen, Q. Towards Rule-ranking Based Fuzzy Rule Interpolation. In Proceedings of the 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Luxembourg, 11–14 July 2021; pp. 1–7. [Google Scholar]
  15. Li, F.; Shang, C.; Li, Y.; Yang, J.; Shen, Q. Fuzzy rule based interpolative reasoning supported by attribute ranking. IEEE Trans. Fuzzy Syst. 2018, 26, 2758–2773. [Google Scholar] [CrossRef]
  16. Chen, S.M.; Chen, Z.J. Weighted fuzzy interpolative reasoning for sparse fuzzy rule-based systems based on piecewise fuzzy entropies of fuzzy sets. Inf. Sci. 2016, 329, 503–523. [Google Scholar] [CrossRef]
  17. Zhou, M.; Shang, C.; Li, G.; Jin, S.; Peng, J.; Shen, Q. Fuzzy Rule Interpolation with a Transformed Rule Base. In Proceedings of the 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Luxembourg, 11–14 July 2021; pp. 1–7. [Google Scholar]
  18. Jiang, C.; Jin, S.; Shang, C.; Shen, Q. Towards utilization of rule base structure to support fuzzy rule interpolation. Expert Syst. 2023, 40, e13097. [Google Scholar] [CrossRef]
  19. Lin, J.; Shang, C.; Shen, Q. Towards Dynamic Fuzzy Rule Interpolation via Density-Based Rule Promotion from Interpolated Outcomes. Mathematics 2024, 12, 402. [Google Scholar] [CrossRef]
  20. Chen, T.; Shang, C.; Yang, J.; Li, F.; Shen, Q. A new approach for transformation-based fuzzy rule interpolation. IEEE Trans. Fuzzy Syst. 2019, 28, 3330–3344. [Google Scholar] [CrossRef]
  21. Tan, Y.; Li, J.; Wonders, M.; Chao, F.; Shum, H.P.; Yang, L. Towards sparse rule base generation for fuzzy rule interpolation. In Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (Fuzz-IEEE), Vancouver, BC, Canada, 24–29 July 2016; pp. 110–117. [Google Scholar]
  22. Alzubi, M.; Almseidin, M.; Kovacs, S.; Al-Sawwa, J.; Alkasassbeh, M. EI-FRI: Extended Incircle Fuzzy Rule Interpolation for Multidimensional Antecedents, Multiple Fuzzy Rules, and Extrapolation Using Total Weight Measurement and Shift Ratio. J. Robot. Control. 2024, 5, 217–227. [Google Scholar] [CrossRef]
  23. Alzubi, M.; Kovacs, S. Some considerations and a benchmark related to the cnf property of the koczy-hirota fuzzy rule interpolation. arXiv 2019, arXiv:1911.05041. [Google Scholar] [CrossRef]
  24. Zhou, W.J.; Maskell, D.L.; Quek, C. Fuzzy interpolation and extrapolation using shift ratio and overall weight measurement based on areas of fuzzy sets. In Proceedings of the 2013 13th UK Workshop on Computational Intelligence (UKCI), Guildford, UK, 9–11 September 2013; pp. 46–53. [Google Scholar]
  25. Chen, S.M.; Ko, Y.K. Fuzzy interpolative reasoning for sparse fuzzy rule-based systems based on alpha-cuts and transformations techniques. IEEE Trans. Fuzzy Syst. 2008, 16, 1626–1648. [Google Scholar] [CrossRef]
  26. Chang, Y.C.; Chen, S.M.; Liau, C.J. A new fuzzy interpolative reasoning method based on the areas of fuzzy sets. In Proceedings of the 2007 IEEE International Conference on Systems, Man and Cybernetics, Montreal, QC, Canada, 7–10 October 2007; pp. 320–325. [Google Scholar]
  27. Li, F.; Shang, C.; Li, Y.; Yang, J.; Shen, Q. Approximate reasoning with fuzzy rule interpolation: Background and recent advances. Artif. Intell. Rev. 2021, 54, 4543–4590. [Google Scholar] [CrossRef]
  28. Almseidin, M.; Alkasassbeh, M.; Alzubi, M.; Al-Sawwa, J. Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation. Cryptography 2022, 6, 24. [Google Scholar] [CrossRef]
  29. Chen, S.M.; Cheng, S.H.; Chen, Z.J. Fuzzy interpolative reasoning based on the ratio of fuzziness of rough-fuzzy sets. Inf. Sci. 2015, 299, 394–411. [Google Scholar] [CrossRef]
  30. Huang, D.M.; Tsang, E.; Yeung, D. A fuzzy interpolative reasoning method. In Proceedings of the 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826), Shanghai, China, 26–29 August 2004; Volume 3, pp. 1826–1830. [Google Scholar]
  31. Hsiao, W.H.; Chen, S.M.; Lee, C.H. A new interpolative reasoning method in sparse rule-based systems. Fuzzy Sets Syst. 1998, 93, 17–22. [Google Scholar] [CrossRef]
  32. Tan, C.L. Phishing dataset for machine learning: Feature evaluation. Mendeley Data 2018, 1, 2018. [Google Scholar]
  33. Chiew, K.L.; Tan, C.L.; Wong, K.; Yong, K.S.; Tiong, W.K. A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf. Sci. 2019, 484, 153–166. [Google Scholar] [CrossRef]
  34. He, M.; Horng, S.J.; Fan, P.; Khan, M.K.; Run, R.S.; Lai, J.L.; Chen, R.J.; Sutanto, A. An efficient phishing webpage detector. Expert Syst. Appl. 2011, 38, 12018–12027. [Google Scholar] [CrossRef]
  35. Guillaume, S.; Charnomordic, B. Learning interpretable Fuzzy Inference Systems with FisPro. Int. J. Inf. Sci. 2011, 181, 4409–4427. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.