The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Outstanding Reviewers

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • ICONS_BA 2025

Computer Vision Conference (CVC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • RSS Feed

DOI: 10.14569/IJACSA.2026.0170391
PDF

An Algorithmic Model Based on Optimization of the Production Rules for Phishing Attacks

Author 1: Anvar Kabulov
Author 2: Erkin Urinbaev
Author 3: Inomjon Yarashov
Author 4: Alisher Otakhonov

International Journal of Advanced Computer Science and Applications(IJACSA), Volume 17 Issue 3, 2026.

  • Abstract and Keywords
  • How to Cite this Article
  • {} BibTeX Source

Abstract: Phishing cyber-hazards, which are a correct cyber threat to audit, monitoring, control, and data acquisition systems in the digitalization environment, are aimed at misleading participants in a complex system and editing personal digitalization data through unauthorized access. In the research work, functioning tables, production rules, algorithmic and mathematical modeling apparatus are used as a foundation for formulating, analyzing, and synthesizing the discrete adaptive behavior of large systems. In the scientific practical research work, phishing identification technologies based on production rules are implemented in solving a scientific problem by integrating access to digitalization resources into control and/or management operations and/or processes. In this research, a set of production rules is created to identify malicious and legitimate resources from URLs, URL features are extracted from a dataset of trusted platforms based on algorithmization, and logical rules are generated from these features; the authenticity of the URLs is then verified using this rule set. The results are compared with other existing models and algorithms, and two different approaches to generating production rules are developed. The study also develops a logical model for building a knowledge base from URL features and demonstrates the representation of malicious attacks through logical implications, conjunctions, and disjunctions. Finally, it tests optimized expressions based on monotone Boolean functions and their perfect disjunctive normal form (CDNF) on an independent test dataset in order to select the most efficient rule system.

Keywords: Petri nets; phishing; production rules; URL; functioning table

Anvar Kabulov, Erkin Urinbaev, Inomjon Yarashov and Alisher Otakhonov. “An Algorithmic Model Based on Optimization of the Production Rules for Phishing Attacks”. International Journal of Advanced Computer Science and Applications (IJACSA) 17.3 (2026). http://dx.doi.org/10.14569/IJACSA.2026.0170391

@article{Kabulov2026,
title = {An Algorithmic Model Based on Optimization of the Production Rules for Phishing Attacks},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2026.0170391},
url = {http://dx.doi.org/10.14569/IJACSA.2026.0170391},
year = {2026},
publisher = {The Science and Information Organization},
volume = {17},
number = {3},
author = {Anvar Kabulov and Erkin Urinbaev and Inomjon Yarashov and Alisher Otakhonov}
}



Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

IJACSA

Upcoming Conferences

Computer Vision Conference (CVC) 2026

21-22 May 2026

  • Amsterdam, The Netherlands

Computing Conference 2026

9-10 July 2026

  • London, United Kingdom

Artificial Intelligence Conference 2026

3-4 September 2026

  • Amsterdam, The Netherlands

Future Technologies Conference (FTC) 2026

15-16 October 2026

  • Berlin, Germany
The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computer Vision Conference
  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

The Science and Information (SAI) Organization Limited is a company registered in England and Wales under Company Number 8933205.