Aulia Novi
Unknown Affiliation

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

Automated Detection Of Network Intrusions Using Machine Learning in Real-Time Systems Aulia Novi; Ryan Satria
International Journal of Computer Technology and Science Vol. 1 No. 2 (2024): April : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i2.63

Abstract

The rapid growth of digital technologies has significantly increased the complexity and frequency of cyber threats, making network security a critical concern in modern information systems. Traditional security approaches, such as rule-based and signature-based systems, are often limited in detecting sophisticated and unknown attacks. Therefore, this study proposes an Anomaly-Based Intrusion Detection System (AbIDS) utilizing machine learning and deep learning techniques to enhance detection capabilities. The research adopts a Design Science Research approach, involving stages of problem identification, data collection, preprocessing, model development, system implementation, and evaluation. Several models, including Decision Tree (DT), Support Vector Machine (SVM), Convolutional Neural Network (CNN), and Long Short-Term Memory (LSTM), are implemented and compared. The results indicate that deep learning models, particularly LSTM and CNN, outperform traditional machine learning methods in terms of accuracy, precision, recall, and F1-score, while maintaining a lower false positive rate. Additionally, the integration of incremental learning enables the system to adapt to new attack patterns without requiring complete retraining, improving scalability and real-time performance. Despite the promising results, challenges such as computational complexity and false positives remain. Overall, the proposed IDS model demonstrates strong potential as an effective and adaptive solution for enhancing network security in dynamic environments.