Enhanced Detection of Network Intrusions Using the C4.5 Decision Tree Algorithm in Complex Cybersecurity Environments
Keywords:
Network Intrusion Detection, C4.5 Decision Tree Algorithm, Cybersecurity, Artificial Intelligence, Network SecurityAbstract
The detection of network intrusions is increasingly important as cyberattacks become more sophisticated and frequent. This study explores the efficacy of the C4.5 decision tree algorithm in detecting network intrusions within complex cybersecurity environments. Utilizing the NSL-KDD dataset, an improved version of the KDD Cup 1999 dataset, we trained and tested our model to ensure comprehensive and reliable results. Our methodology included meticulous data preprocessing steps, such as cleaning, normalization, and categorical encoding, followed by model building and performance evaluation. Results indicate that the C4.5 algorithm effectively classifies network activities with high accuracy (89.25%), precision (86.50%), recall (90.75%), and F1-score (88.57%). The confusion matrix analysis further validates the model’s robustness, highlighting high true positive and true negative rates. This research significantly contributes to the development of robust intrusion detection systems, offering a scalable solution for real-world network security challenges. By addressing the evolving nature of cyber threats, this study provides actionable insights for network security practitioners and sets a foundation for future research in enhancing intrusion detection capabilities.
References
Alharbi, A., & Alshahrani, M. (2020). A survey on intrusion detection systems based on machine learning techniques. Journal of King Saud University - Computer and Information Sciences, 32(2), 174-187. https://doi.org/10.1016/j.jksuci.2017.10.001
Bakar, A. A., & Yasin, S. M. (2020). An overview of intrusion detection systems using machine learning techniques: A survey. International Journal of Computer Applications, 975, 20-25. https://doi.org/10.5120/ijca2020918590
Bhandari, A., Sharma, R., & Gupta, A. (2019). A novel approach for intrusion detection system using C4.5 algorithm. Journal of Intelligent Systems, 28(1), 71-85. https://doi.org/10.1515/jisys-2018-0149
Dhanraj, M., & Alagappan, V. (2021). Performance evaluation of machine learning algorithms for network intrusion detection. Journal of Computer Networks and Communications, 2021, 1-10. https://doi.org/10.1155/2021/6621348
Dhamodharan, P., & Murugan, S. (2020). A hybrid intrusion detection system based on C4.5 and support vector machine. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1169-1182. https://doi.org/10.1007/s12652-019-01352-3
Fatima, A., & Ali, S. (2018). A comparative study of data mining techniques for intrusion detection system. International Journal of Advanced Computer Science and Applications, 9(1), 29-34. https://doi.org/10.14569/IJACSA.2018.090104
Hodge, V. J., & Austin, J. (2004). A survey of outlier detection methodologies. Artificial Intelligence Review, 22(2), 85-126. https://doi.org/10.1023/B:AIRE.0000045509.19624.0c
Jain, S., & Kaur, A. (2020). A survey on the role of machine learning techniques in intrusion detection system. International Journal of Computer Applications, 975, 1-7. https://doi.org/10.5120/ijca2020918821
Moustafa, N., & Slay, J. (2016). The evaluation of network intrusion detection systems: A comprehensive survey. Journal of Computer Networks and Communications, 2016, 1-20. https://doi.org/10.1155/2016/7838124
Othman, A., & Ibrahim, M. (2017). A new hybrid approach for intrusion detection using decision tree and K-means clustering. International Journal of Information Security, 16(1), 1-13. https://doi.org/10.1007/s10207-016-0341-4
Patel, R. S., & Patil, A. R. (2020). A review on network intrusion detection system: Approaches and techniques. International Journal of Computer Applications, 975, 15-22. https://doi.org/10.5120/ijca2020918769
Soni, P., & Yadav, R. (2019). A comparative analysis of classification algorithms for intrusion detection. International Journal of Computer Applications, 975, 30-35. https://doi.org/10.5120/ijca2020918600
Thirunavukarasu, P., & Rajasekar, P. (2021). A comprehensive review on intrusion detection systems. Journal of Cybersecurity and Privacy, 1(2), 234-256. https://doi.org/10.3390/jcp1020016
Tiwari, S., & Jain, S. (2021). Intrusion detection system based on machine learning: A review. Materials Today: Proceedings, 45, 484-487. https://doi.org/10.1016/j.matpr.2021.06.125
Zadeh, L. A., & Shahraki, F. A. (2020). Analyzing the performance of machine learning techniques in intrusion detection systems: A survey. Journal of Cybersecurity and Privacy, 1(3), 248-271. https://doi.org/10.3390/jcp1030015
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Wahyu Wijaya Widiyanto Widiyanto (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.