Detection of Attacks in Computer Networks Using C4.5 Decision Tree Algorithm: An Approach to Network Security
DOI:
https://doi.org/10.62951/ijies.v1i4.48Keywords:
Attack Detection, Computer Networks, C4.5 Decision Tree, Artificial Intelligence, Information SecurityAbstract
The detection of computer network attacks is becoming increasingly important as the complexity of cyber-attacks threatening information systems and infrastructure continues to rise. To address these threats, artificial intelligence techniques have become a primary focus in the development of more effective attack detection systems. One algorithm that has proven reliable in this context is the C4.5 decision tree. This study aims to apply the C4.5 algorithm in network attack detection using a dataset that includes various types of attacks and network activities. The process includes data preprocessing, decision tree model building, and model performance evaluation. The results show that the C4.5 decision tree algorithm is effective in classifying network activities into attacks and normal activities with a satisfactory level of accuracy. The model successfully recognizes attack-related patterns, and further analysis identifies key factors influencing attack detection. This research provides a significant contribution to the development of reliable and efficient attack detection systems in computer networks. By applying the C4.5 decision tree algorithm, it is expected to help enhance information security and protect network infrastructure from increasingly complex cyber threats
References
Ani, M. S., & Xavier, S. B. (2015). A hybrid intrusion detection system based on C5.0 decision tree and one-class SVM. International Journal of Current Engineering and Technology, 5(3), 2001–2007.
Beny Abukhaer Tatara, B., Abdurachman, B., Mustofa, D. L., & Yacobus, D. (2023). The potential of cyber attacks in Indonesia’s digital economy transformation. NUANSA: Jurnal Penelitian Ilmu Sosial Dan Keagamaan Islam, 20(1), 19–37. https://doi.org/10.19105/nuansa.v20i1.7362
George, A. S., Baskar, T., & Srikaanth, P. B. (2024). Cyber threats to critical infrastructure: Assessing vulnerabilities across key sectors. Partners Universal International Innovative Journal, 2(1), 51–75. https://doi.org/10.5281/zenodo.10639463
Gupta, C., Johri, I., Srinivasan, K., Hu, Y., & Qaisar, S. M. (2022). A systematic review on machine learning and deep learning. Progress in Biophysics and Molecular Biology, June. https://doi.org/10.1016/j.pbiomolbio.2022.07.004
Joseph, S. (n.d.). Computers’ effect on society: Exposing their manifold benefits.
Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., & Alazab, A. (2020). Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine. Electronics (Switzerland), 9(1). https://doi.org/10.3390/electronics9010173
Lestari, A. (2020). Increasing accuracy of C4.5 algorithm using information gain ratio and AdaBoost for classification of chronic kidney disease. Journal of Soft Computing Exploration, 1(1), 32–38. https://doi.org/10.52465/joscex.v1i1.6
Mahbooba, B., Timilsina, M., Sahal, R., & Serrano, M. (2021). Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity, 2021. https://doi.org/10.1155/2021/6634811
Nagar, U. (2021). A study on feature analysis and ensemble-based intrusion detection scheme using CICIDS-2017 dataset.
Ozkan-Okay, M., Yilmaz, A. A., Akin, E., Aslan, A., & Aktug, S. S. (2023). A comprehensive review of cyber security vulnerabilities. Electronics, 12(1333).
Sarker, I. H. (2023). Machine learning for intelligent data analysis and automation in cybersecurity: Current and future prospects. Annals of Data Science, 10(6), 1473–1498. https://doi.org/10.1007/s40745-022-00444-2
Tama, B. A., Nkenyereye, L., Islam, S. M. R., & Kwak, K. S. (2020). An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access, 8, 24120–24134. https://doi.org/10.1109/ACCESS.2020.2969428
Tariq, R., Casillas-Muñoz, F. A., Hassan, S. T., & Ramírez-Montoya, M. S. (2024). Synergy of Internet of Things and education: Cyber-physical systems contributing towards remote laboratories, improved learning, and school management. Journal of Social Studies Education Research, 15(2 Special issue), 305–352.
Wang, J. (2022). Application of C4.5 decision tree algorithm for evaluating the college music education. Mobile Information Systems, 2022. https://doi.org/10.1155/2022/7442352
Wu, Y., Wei, D., & Feng, J. (2020). Network attacks detection methods based on deep learning techniques: A survey. Security and Communication Networks, 2020. https://doi.org/10.1155/2020/8872923
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Information Engineering and Science

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.