Detection of Attacks in Computer Networks Using C4.5 Decision Tree Algorithm: An Approach to Network Security

Authors

  • Wahyu Wijaya Widiyanto Politeknik Indonusa Surakarta
  • Rizka Licia Politeknik Indonusa Surakarta

DOI:

https://doi.org/10.62951/ijies.v1i4.48

Keywords:

Attack Detection, Computer Networks, C4.5 Decision Tree, Artificial Intelligence, Information Security

Abstract

The detection of computer network attacks is becoming increasingly important as the complexity of cyber-attacks threatening information systems and infrastructure continues to rise. To address these threats, artificial intelligence techniques have become a primary focus in the development of more effective attack detection systems. One algorithm that has proven reliable in this context is the C4.5 decision tree. This study aims to apply the C4.5 algorithm in network attack detection using a dataset that includes various types of attacks and network activities. The process includes data preprocessing, decision tree model building, and model performance evaluation. The results show that the C4.5 decision tree algorithm is effective in classifying network activities into attacks and normal activities with a satisfactory level of accuracy. The model successfully recognizes attack-related patterns, and further analysis identifies key factors influencing attack detection. This research provides a significant contribution to the development of reliable and efficient attack detection systems in computer networks. By applying the C4.5 decision tree algorithm, it is expected to help enhance information security and protect network infrastructure from increasingly complex cyber threats

References

Ani, M. S., & Xavier, S. B. (2015). A hybrid intrusion detection system based on C5.0 decision tree and one-class SVM. International Journal of Current Engineering and Technology, 5(3), 2001–2007.

Beny Abukhaer Tatara, B., Abdurachman, B., Mustofa, D. L., & Yacobus, D. (2023). The potential of cyber attacks in Indonesia’s digital economy transformation. NUANSA: Jurnal Penelitian Ilmu Sosial Dan Keagamaan Islam, 20(1), 19–37. https://doi.org/10.19105/nuansa.v20i1.7362

George, A. S., Baskar, T., & Srikaanth, P. B. (2024). Cyber threats to critical infrastructure: Assessing vulnerabilities across key sectors. Partners Universal International Innovative Journal, 2(1), 51–75. https://doi.org/10.5281/zenodo.10639463

Gupta, C., Johri, I., Srinivasan, K., Hu, Y., & Qaisar, S. M. (2022). A systematic review on machine learning and deep learning. Progress in Biophysics and Molecular Biology, June. https://doi.org/10.1016/j.pbiomolbio.2022.07.004

Joseph, S. (n.d.). Computers’ effect on society: Exposing their manifold benefits.

Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., & Alazab, A. (2020). Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine. Electronics (Switzerland), 9(1). https://doi.org/10.3390/electronics9010173

Lestari, A. (2020). Increasing accuracy of C4.5 algorithm using information gain ratio and AdaBoost for classification of chronic kidney disease. Journal of Soft Computing Exploration, 1(1), 32–38. https://doi.org/10.52465/joscex.v1i1.6

Mahbooba, B., Timilsina, M., Sahal, R., & Serrano, M. (2021). Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity, 2021. https://doi.org/10.1155/2021/6634811

Nagar, U. (2021). A study on feature analysis and ensemble-based intrusion detection scheme using CICIDS-2017 dataset.

Ozkan-Okay, M., Yilmaz, A. A., Akin, E., Aslan, A., & Aktug, S. S. (2023). A comprehensive review of cyber security vulnerabilities. Electronics, 12(1333).

Sarker, I. H. (2023). Machine learning for intelligent data analysis and automation in cybersecurity: Current and future prospects. Annals of Data Science, 10(6), 1473–1498. https://doi.org/10.1007/s40745-022-00444-2

Tama, B. A., Nkenyereye, L., Islam, S. M. R., & Kwak, K. S. (2020). An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access, 8, 24120–24134. https://doi.org/10.1109/ACCESS.2020.2969428

Tariq, R., Casillas-Muñoz, F. A., Hassan, S. T., & Ramírez-Montoya, M. S. (2024). Synergy of Internet of Things and education: Cyber-physical systems contributing towards remote laboratories, improved learning, and school management. Journal of Social Studies Education Research, 15(2 Special issue), 305–352.

Wang, J. (2022). Application of C4.5 decision tree algorithm for evaluating the college music education. Mobile Information Systems, 2022. https://doi.org/10.1155/2022/7442352

Wu, Y., Wei, D., & Feng, J. (2020). Network attacks detection methods based on deep learning techniques: A survey. Security and Communication Networks, 2020. https://doi.org/10.1155/2020/8872923

Published

2024-10-15

How to Cite

Wahyu Wijaya Widiyanto, & Rizka Licia. (2024). Detection of Attacks in Computer Networks Using C4.5 Decision Tree Algorithm: An Approach to Network Security. International Journal of Information Engineering and Science, 1(4), 01–12. https://doi.org/10.62951/ijies.v1i4.48

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.