Abstract: The computer security system is a protection for computers which is similar to the immune system in the human body. It includes the protection of all operations and resources within the computer and it prevention the abuse of intruders who aim to tamper with the security of the computer system. There are many important methods to protect computer systems such as intrusion detection system and honeypot system. The intrusion detection system is divided into abuse detection and anomaly detection. Detection of anomalies is an important method to detect new or unknown attacks. In this research, a robust and integrated system based on the detection system depending on the famous classification algorithm (C4.5) and the honeypot system. The proposed system is used to lure attackers and keep them away from the product system. Intrusion detection system is built and then several tests are conducted to show the detection capabilities that could be achieved. The experiment result of proposed system explain which services are most vulnerable to attack and what weaknesses are present in the product system.
Ismael Salih Aref, Ziyad Tariq Mustafa, Iraq Ali Hussain and Samah Jalil Sabaa, 2020. Online Intrusion Detection System using C4.5 Algorithm with Honeypot. Journal of Engineering and Applied Sciences, 15: 1127-1132.