Analisis Perbandingan CNN, SVM, dan Hybrid CNN-SVM untuk Deteksi Anomali Trafik Jaringan
DOI:
https://doi.org/10.62712/juktisi.v4i3.748Keywords:
Network Intrusion Detection System, Anomaly Detection, Convolutional Neural Network, Support Vector Machine, Hybrid CNN–SVMAbstract
The rapid growth of information technology has significantly increased the volume and complexity of network traffic, leading to cyber security threats that are increasingly dynamic and difficult to detect using traditional security systems. The limitations of signature-based detection systems in identifying new attacks, including zero-day attacks, necessitate the adoption of more adaptive anomaly detection approaches through the utilization of machine learning and deep learning within Network Intrusion Detection Systems (NIDS). This study aims to analyze and compare the performance of Convolutional Neural Networks (CNN), Support Vector Machines (SVM), and a hybrid CNN–SVM model in detecting network traffic anomalies. This research employs a quantitative approach using an experimental method to evaluate the performance of the three models based on the CIC-IDS2017 dataset. The experimental process includes data preprocessing, model development, and performance evaluation using accuracy, precision, recall, F1-score, and confusion matrix metrics. The results indicate that the CNN and SVM baseline models achieve high accuracy levels of 98.85% and 98.66%, respectively, but still exhibit limitations in detecting minority attack classes. The hybrid CNN–SVM model achieves the best performance with an accuracy of 99.41% and a more balanced macro-average recall, indicating improved generalization across classes. The integration of CNN as a feature extractor and SVM as a classifier is proven to be effective in leveraging the complexity of network traffic features while enhancing classification stability. Therefore, the hybrid CNN–SVM approach can be recommended as a more effective and reliable network traffic anomaly detection method compared to single-model approaches in supporting modern network security systems.
Downloads
References
E. Susanto, Lady Antira, K. Kevin, E. Stanzah, and A. A. Majid, “MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL,” Journal of Business And Entrepreneurship, vol. 11, no. 1, p. 23, Jun. 2023, doi: 10.46273/jobe.v11i1.365.
Ade Irawan, Wildan Hamzah Nur Fadholi, Zahwa Erikamaretha, and Fried Sinlae, “Tantangan dan Strategi Manajemen Keamanan Siber di Indonesia berbasis IoT,” JOURNAL ZETROEM, vol. 6, no. 1, pp. 114–119, Apr. 2024, doi: 10.36526/ztr.v6i1.3376.
H. Al-Rushdan, M. Shurman, S. H. Alnabelsi, and Q. Althebyan, “Zero-Day Attack Detection and Prevention in Software-Defined Networks,” in 2019 International Arab Conference on Information Technology (ACIT), IEEE, Dec. 2019, pp. 278–282. doi: 10.1109/ACIT47987.2019.8991124.
S. Stat. , M. Kom. Satriadi Putra Santika, “MENGENAL ZERO-DAY ATTACK, CELAH KEAMANAN YANG TIDAK TERLIHAT,” BINUS UNIVERSITY SCHOOL OF COMPUTER SCIENCE.
Tushar Rakshe and Vishal Gonjari, “Anomaly based Network Intrusion Detection using Machine Learning Techniques,” INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT), vol. 6, no. 5, May 2017.
S. Latif, F. F. Dola, MD. M. Afsar, I. Jahan Esha, and D. Nandi, “Investigation of Machine Learning Algorithms for Network Intrusion Detection,” International Journal of Information Engineering and Electronic Business, vol. 14, no. 2, pp. 1–22, Apr. 2022, doi: 10.5815/ijieeb.2022.02.01.
Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, May 2015, doi: 10.1038/nature14539.
R. W. Shiddiq, N. Karna, and I. Dyah Irawati, “Optimizing Machine Learning-Based Network Intrusion Detection System with Oversampling, Feature Selection and Extraction,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI), vol. 11, no. 2, pp. 225–237, 2025, doi: 10.26555/jiteki.v11i2.30675.
R. Kale, Z. Lu, K. W. Fok, and V. L. L. Thing, “A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection,” Dec. 2022, doi: 10.1109/BigDataSecurityHPSCIDS54978.2022.00034.
M. M. Issa, M. Aljanabi, and H. M. Muhialdeen, “Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations,” Journal of Intelligent Systems, vol. 33, no. 1, Jun. 2024, doi: 10.1515/jisys-2023-0248.
O. Nwabuko, “An Overview of Research Study Designs in Quantitative Research Methodology,” American Journal of Medical and Clinical Research & Reviews, vol. 03, no. 05, pp. 01–06, 2024, doi: 10.58372/2835-6276.1169.
H. Dermawan and A. Hasibuan, “Metode Penelitian Eksperimen: Prinsip, Prosedur, dan Aplikasi dalam Penelitian Ilmiah,” Factory Jurnal Industri, Manajemen dan Rekayasa Sistem Industri, vol. 3, no. 2, pp. 47–50, May 2025, doi: 10.56211/factory.v3i2.729.
Zafar Iqbal Khan, Mohammad Mazhar Afzal, and Khurram Naim Shamsi, “A Comprehensive Study on CIC-IDS2017 Dataset for Intrusion Detection Systems,” International Research Journal on Advanced Engineering Hub (IRJAEH), vol. 2, no. 02, pp. 254–260, Feb. 2024, doi: 10.47392/IRJAEH.2024.0041.
H. Cevikalp, “High-dimensional data clustering by using local affine/convex hulls,” Pattern Recognit Lett, vol. 128, pp. 427–432, Dec. 2019, doi: 10.1016/j.patrec.2019.10.007.
P. G. J. and N. K. V., “Google Colaboratory : Tool for Deep Learning and Machine Learning Applications,” Indian Journal of Computer Science, vol. 6, no. 3–4, p. 23, Aug. 2021, doi: 10.17010/ijcs/2021/v6/i3-4/165408
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Susiana Khosasih, Romi Antoni, Ricky Irnanda, Iswanto, Rahmat Humala Putra Hasibuan

This work is licensed under a Creative Commons Attribution 4.0 International License.















