Implementation of the Decision Tree Method for Detecting Attacks in Networks

Authors

  • Nissi Sari Margaretha Angelina Sitanggang STMIK TIME
  • Octara Pribadi STMIK TIME
  • Herman STMIK TIME

DOI:

https://doi.org/10.59934/jaiea.v5i1.1272

Keywords:

Accuracy, Network Security, CICIDS 2017, Decision Tree, DDoS

Abstract

The rapid development of internet technology has led to an increase in cybercrime, including attacks on computer networks such as Distributed Denial of Service (DDoS). These attacks can cause serious disruption to systems and steal important data. Therefore, early detection of attacks is very important to maintain network security. One effective method for detecting anomalies in networks is the Decision Tree algorithm, due to its ability to classify data quickly and easily. This study aims to develop a Decision Tree-based attack detection model using the CICIDS 2017 dataset. The results of the study show that this algorithm is capable of classifying attack data with a high degree of accuracy and is reliable in handling large-scale data. Thus, the resulting model can help improve the security and performance of computer networks

Downloads

Download data is not yet available.

References

M. I. Manalu and F. P. Hutabarat, “Pendeteksian Anomali Trafik Jaringan Menggunakan Metode Decision Tree,” vol. 01, no. 01, 2024.

Y. I. Mahendra and R. E. Putra, “Penerapan Algoritma Gradient Boosted Decision Tree ( GBDT ) untuk Klasifikasi Serangan DDoS,” vol. 06, pp. 158–166, 2024.

M. Fadhlurrohman, A. Muliawati, and B. Hananto, “Analisis Kinerja Intrusion Detection System pada Deteksi Anomali dengan Metode Decision Tree Terhadap Serangan Siber,” J. Ilmu Komput. dan Agri-Informatika, vol. 8, no. 2, pp. 90–94, 2021, doi: 10.29244/jika.8.2.90-94.

F. Febriansyah, Z. Asti Dwiyanti, and Diash Firdaus, “Deteksi Serangan Low Rate Ddos Pada Jaringan Tradisional Menggunakan Machine Learning Dengan Algoritma Decision Tree,” Cyber Secur. dan Forensik Digit., vol. 6, no. 1, pp. 6–11, 2023, doi: 10.14421/csecurity.2023.6.1.3951.

R. Muhendra, KONSEP DASAR SISTEM INSTRUMENTASI , WIRELESS SENSOR NETWORK DAN INTERNET OF THINGS ( IoT ), no. 39. 2021. [Online]. Available: https://repository.ubharajaya.ac.id/27392/1/Gabung Sistem Instrumentasi.pdf

K. Kurniabudi, A. Harris, and A. E. Mintaria, “Komparasi Information Gain, Gain Ratio, CFs-Bestfirst dan CFs-PSO Search Terhadap Performa Deteksi Anomali,” J. Media Inform. Budidarma, vol. 5, no. 1, p. 332, 2021, doi: 10.30865/mib.v5i1.2258.

U. Suriani, I. P. Ninditama, and W. Syaputra, “Pemodelan Prediktif Keterlambatan Bicara pada Balita Terkait dengan Penggunaan Smartphone Menggunakan Data Mining,” vol. 5, no. 1, pp. 129–138, 2024, doi: 10.51519/journalita.v5i1.589.

D. Firdaus, F. Fahira, and R. Rianti, “Deteksi Anomali Dan Serangan Low Rate Ddos Dalam Lalu Lintas Jaringan Menggunakan Naive Bayes,” Naratif J. Nas. Riset, Apl. dan Tek. Inform., vol. 5, no. 2, pp. 140–148, 2023, doi: 10.53580/naratif.v5i2.208.

Downloads

Published

2025-10-15

How to Cite

Nissi Sari Margaretha Angelina Sitanggang, Octara Pribadi, & Herman. (2025). Implementation of the Decision Tree Method for Detecting Attacks in Networks. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 5(1), 277–283. https://doi.org/10.59934/jaiea.v5i1.1272