files/journal/2022-09-02_12-54-44-000000_354.png

Journal of Engineering and Applied Sciences

ISSN: Online 1818-7803
ISSN: Print 1816-949x
115
Views
0
Downloads

Online Intrusion Detection System using C4.5 Algorithm with Honeypot

Ismael Salih Aref, Ziyad Tariq Mustafa, Iraq Ali Hussain and Samah Jalil Sabaa
Page: 1127-1132 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

The computer security system is a protection for computers which is similar to the immune system in the human body. It includes the protection of all operations and resources within the computer and it prevention the abuse of intruders who aim to tamper with the security of the computer system. There are many important methods to protect computer systems such as intrusion detection system and honeypot system. The intrusion detection system is divided into abuse detection and anomaly detection. Detection of anomalies is an important method to detect new or unknown attacks. In this research, a robust and integrated system based on the detection system depending on the famous classification algorithm (C4.5) and the honeypot system. The proposed system is used to lure attackers and keep them away from the product system. Intrusion detection system is built and then several tests are conducted to show the detection capabilities that could be achieved. The experiment result of proposed system explain which services are most vulnerable to attack and what weaknesses are present in the product system.


How to cite this article:

Ismael Salih Aref, Ziyad Tariq Mustafa, Iraq Ali Hussain and Samah Jalil Sabaa. Online Intrusion Detection System using C4.5 Algorithm with Honeypot.
DOI: https://doi.org/10.36478/jeasci.2020.1127.1132
URL: https://www.makhillpublications.co/view-article/1816-949x/jeasci.2020.1127.1132