Implementation of the Decision Tree Method for Detecting Attacks in Networks
DOI:
https://doi.org/10.59934/jaiea.v5i1.1272Keywords:
Accuracy, Network Security, CICIDS 2017, Decision Tree, DDoSAbstract
The rapid development of internet technology has led to an increase in cybercrime, including attacks on computer networks such as Distributed Denial of Service (DDoS). These attacks can cause serious disruption to systems and steal important data. Therefore, early detection of attacks is very important to maintain network security. One effective method for detecting anomalies in networks is the Decision Tree algorithm, due to its ability to classify data quickly and easily. This study aims to develop a Decision Tree-based attack detection model using the CICIDS 2017 dataset. The results of the study show that this algorithm is capable of classifying attack data with a high degree of accuracy and is reliable in handling large-scale data. Thus, the resulting model can help improve the security and performance of computer networks
Downloads
References
M. I. Manalu and F. P. Hutabarat, “Pendeteksian Anomali Trafik Jaringan Menggunakan Metode Decision Tree,” vol. 01, no. 01, 2024.
Y. I. Mahendra and R. E. Putra, “Penerapan Algoritma Gradient Boosted Decision Tree ( GBDT ) untuk Klasifikasi Serangan DDoS,” vol. 06, pp. 158–166, 2024.
M. Fadhlurrohman, A. Muliawati, and B. Hananto, “Analisis Kinerja Intrusion Detection System pada Deteksi Anomali dengan Metode Decision Tree Terhadap Serangan Siber,” J. Ilmu Komput. dan Agri-Informatika, vol. 8, no. 2, pp. 90–94, 2021, doi: 10.29244/jika.8.2.90-94.
F. Febriansyah, Z. Asti Dwiyanti, and Diash Firdaus, “Deteksi Serangan Low Rate Ddos Pada Jaringan Tradisional Menggunakan Machine Learning Dengan Algoritma Decision Tree,” Cyber Secur. dan Forensik Digit., vol. 6, no. 1, pp. 6–11, 2023, doi: 10.14421/csecurity.2023.6.1.3951.
R. Muhendra, KONSEP DASAR SISTEM INSTRUMENTASI , WIRELESS SENSOR NETWORK DAN INTERNET OF THINGS ( IoT ), no. 39. 2021. [Online]. Available: https://repository.ubharajaya.ac.id/27392/1/Gabung Sistem Instrumentasi.pdf
K. Kurniabudi, A. Harris, and A. E. Mintaria, “Komparasi Information Gain, Gain Ratio, CFs-Bestfirst dan CFs-PSO Search Terhadap Performa Deteksi Anomali,” J. Media Inform. Budidarma, vol. 5, no. 1, p. 332, 2021, doi: 10.30865/mib.v5i1.2258.
U. Suriani, I. P. Ninditama, and W. Syaputra, “Pemodelan Prediktif Keterlambatan Bicara pada Balita Terkait dengan Penggunaan Smartphone Menggunakan Data Mining,” vol. 5, no. 1, pp. 129–138, 2024, doi: 10.51519/journalita.v5i1.589.
D. Firdaus, F. Fahira, and R. Rianti, “Deteksi Anomali Dan Serangan Low Rate Ddos Dalam Lalu Lintas Jaringan Menggunakan Naive Bayes,” Naratif J. Nas. Riset, Apl. dan Tek. Inform., vol. 5, no. 2, pp. 140–148, 2023, doi: 10.53580/naratif.v5i2.208.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.







