📄
Abstract
The detection of computer network attacks is becoming increasingly important as the complexity and frequency of cyber-attacks threatening information systems and network infrastructure continue to rise. These attacks may lead to severe consequences, including data breaches, service disruptions, and financial losses. To address these challenges, artificial intelligence techniques have become a major focus in the development of more effective, adaptive, and reliable intrusion detection systems. Among various classification algorithms, the C4.5 decision tree has demonstrated strong performance due to its simplicity, interpretability, and high classification accuracy. This study aims to apply the C4.5 algorithm for network attack detection using a comprehensive dataset that includes multiple categories of attacks and normal network activities. The proposed methodology consists of several stages, including data preprocessing, feature selection, decision tree model construction, and performance evaluation using standard metrics such as accuracy, precision, recall, and F1-score. Data preprocessing is performed to handle missing values, normalize data, and reduce noise, thereby improving the overall quality of the dataset and enhancing classification results. The experimental results indicate that the C4.5 decision tree algorithm effectively classifies network traffic into attack and normal categories with a satisfactory level of accuracy. The model successfully identifies attack-related patterns and highlights significant features that influence detection performance. Further analysis reveals that appropriate feature selection and parameter tuning significantly contribute to improving model reliability and robustness. This research provides a valuable contribution to the development of efficient, accurate, and practical network intrusion detection systems. The proposed approach is expected to strengthen information security frameworks and support proactive defense strategies against increasingly sophisticated cyber threats, thereby enhancing the protection of critical network infrastructures.