International Journal of Information Engineering and Science
Vol. 1 No. 4 (2024): November : International Journal of Information Engineering and Science

Detection of Attacks in Computer Networks Using C4.5 Decision Tree Algorithm: An Approach to Network Security

Wahyu Wijaya Widiyanto (Unknown)
Rizka Licia (Unknown)



Article Info

Publish Date
15 Oct 2024

Abstract

The detection of computer network attacks is becoming increasingly important as the complexity and frequency of cyber-attacks threatening information systems and network infrastructure continue to rise. These attacks may lead to severe consequences, including data breaches, service disruptions, and financial losses. To address these challenges, artificial intelligence techniques have become a major focus in the development of more effective, adaptive, and reliable intrusion detection systems. Among various classification algorithms, the C4.5 decision tree has demonstrated strong performance due to its simplicity, interpretability, and high classification accuracy. This study aims to apply the C4.5 algorithm for network attack detection using a comprehensive dataset that includes multiple categories of attacks and normal network activities. The proposed methodology consists of several stages, including data preprocessing, feature selection, decision tree model construction, and performance evaluation using standard metrics such as accuracy, precision, recall, and F1-score. Data preprocessing is performed to handle missing values, normalize data, and reduce noise, thereby improving the overall quality of the dataset and enhancing classification results. The experimental results indicate that the C4.5 decision tree algorithm effectively classifies network traffic into attack and normal categories with a satisfactory level of accuracy. The model successfully identifies attack-related patterns and highlights significant features that influence detection performance. Further analysis reveals that appropriate feature selection and parameter tuning significantly contribute to improving model reliability and robustness. This research provides a valuable contribution to the development of efficient, accurate, and practical network intrusion detection systems. The proposed approach is expected to strengthen information security frameworks and support proactive defense strategies against increasingly sophisticated cyber threats, thereby enhancing the protection of critical network infrastructures.

Copyrights © 2024






Journal Info

Abbrev

IJIES

Publisher

Subject

Engineering

Description

The scope of the this Journal covers the fields of Information Engineering and Science. This journal is a means of publication and a place to share research and development work in the field of ...