Implementasi Support Vector Machine (SVM) Untuk Deteksi Serangan Jaringan Pada Sistem Keamanan Jaringan Kampus
Implementation of Support Vector Machine (SVM) for Network Attack Detection in Campus Network Security System
Abstract
Network security in campus environments faces increasingly complex challenges due to the rapid growth of internet usage, digital academic systems, and the large number of devices connected to the network. One of the main problems is the limitation of conventional security systems in detecting new or anomalous network attacks. Traditional systems generally rely on predefined attack signatures, making them ineffective against previously unknown attacks. Therefore, this study proposes a solution by implementing the Support Vector Machine (SVM) method for automatic network attack detection. The research method includes the collection of campus network traffic data, data preprocessing stages such as data cleaning, normalization, and feature selection, SVM model training, and performance evaluation using confusion matrix and ROC curve. The results show that the SVM model is able to classify normal traffic and attack traffic with very high accuracy. These findings indicate that SVM is an effective method for intrusion detection and can significantly enhance campus network security in an adaptive and efficient manner.
References
“Towards An Efficient Internet of Things Intrusion Detection by Using Support Vector Machine, Baghdad Science Journal, 2024.”, doi: 11067.
Y. Irawan, R. Pramitasari, W. M. Ashari, and A. N. H. Yansyah, “Support Vector Machine Classification Algorithm for Detecting DDoS Attacks on Network Traffic,” Journal of Applied Informatics and Computing, vol. 9, no. 4, pp. 1945–1954, 2025.
R. W. A. Yahya, “Mendeteksi Dan Pencegahan Serangan Distributed Denial Of Service (Ddos) Pada Jaringan Kampus Menggunakan Algoritma K-Nearest Neighbors,” s1, Universitas Lancang Kuning, 2024. Accessed: Mar. 01, 2026. [Online]. Available: https://repository.unilak.ac.id/5285
H. Haeruddin, E. Erick, and H. W. Aripradono, “Perbandingan Support Vector Machine, Random Forest Classifier, dan K-Nearest Neighbour dalam Pendeteksian Anomali pada Jaringan DDos,” Jurnal Teknologi Informasi dan Multimedia, vol. 7, no. 1, pp. 23–33, 2025.
K. M. Abuali, L. Nissirat, and A. Al-Samawi, “Advancing network security with AI: SVM-based deep learning for intrusion detection,” Sensors, vol. 23, no. 21, p. 8959, 2023.
T. Tan, H. Sama, G. Wijaya, and O. E. Aboagye, “Studi Perbandingan Deteksi Intrusi Jaringan Menggunakan Machine Learning:(Metode SVM dan ANN),” Jurnal Teknologi dan Informasi, vol. 13, no. 2, pp. 152–164, 2023.
S. Jumpathong, K. Kriengket, P. Boonkwan, and T. Supnithi, “Anomaly Detection in Lexical Definitions via One-Class Classification Techniques,” in 2021 16th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP), IEEE, 2021, pp. 1–6. Accessed: Jan. 27, 2026. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9678166/
A. Hozouri, A. Mirzaei, and M. Effatparvar, “A comprehensive survey on intrusion detection systems with advances in machine learning, deep learning and emerging cybersecurity challenges,” Discov Artif Intell, vol. 5, no. 1, p. 314, Nov. 2025, doi: 10.1007/s44163-025-00578-1.
“[8] A Systematic Review on Intrusion Detection System,... - Google Scholar.” Accessed: Jan. 27, 2026. [Online]. Available: https://scholar.google.com/scholar?hl=id&as_sdt=0%2C5&q=%5B8%5D%09A+Systematic+Review+on+Intrusion+Detection+System%2C+OJSScience%2C+2024.&btnG=
P. Bountzis, D. Kavallieros, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris, “A deep one-class classifier for network anomaly detection using autoencoders and one-class support vector machines,” Frontiers in Computer Science, vol. 7, p. 1646679, 2025.
A. Zahoor, W. Abbasi, M. Z. Babar, and A. Aljohani, “Robust iot security using isolation forest and one class svm algorithms,” Scientific Reports, vol. 15, no. 1, p. 36586, 2025.
W. Khreich, B. Khosravifar, A. Hamou-Lhadj, and C. Talhi, “An anomaly detection system based on variable N-gram features and one-class SVM,” Information and Software Technology, vol. 91, pp. 186–197, 2017.
S. Golande, S. Vaidya, A. Pardeshi, V. Katkade, and V. Pawar, “An Efficient Network Intrusion Detection and Classification System using Machine Learning,” International Journal of Advanced Research in Science, Communication and Technology, 2024, Accessed: Jan. 27, 2026. [Online]. Available: https://www.researchgate.net/profile/Shashikant-Golande-2/publication/385671415_An_Efficient_Network_Intrusion_Detection_and_Classification_System_using_Machine_Learning/links/6730cc2a5852dd723cb56f3e/An-Efficient-Network-Intrusion-Detection-and-Classification-System-using-Machine-Learning.pdf
K. A. Nugroho, T. Hariguna, and A. S. Barkah, “Optimizing Early Network Intrusion Detection: A Comparison of LSTM and LinearSVC with SMOTE on Imbalanced Data,” Jurnal Teknik Informatika (Jutif), vol. 6, no. 6, pp. 5349–5370, 2025.
A. Alsajri and A. Steiti, “Intrusion detection system based on machine learning algorithms:(SVM and genetic algorithm),” Babylonian Journal of Machine Learning, vol. 2024, pp. 15–29, 2024.
A. T. Zy, A. T. Sasongko, and A. Z. Kamalia, “Penerapan Naïve Bayes Classifier, Support Vector Machine, dan Decision Tree untuk Meningkatkan Deteksi Ancaman Keamanan Jaringan,” Media Online, vol. 4, no. 1, pp. 610–617, 2023.
V. Timčenko and S. Gajin, “Machine learning based network anomaly detection for IoT environments,” in ICIST-2018 conference, 2018. Accessed: Jan. 27, 2026. [Online]. Available: https://www.eventiotic.com/eventiotic/files/Papers/URL/e5bb6a65-0030-4acf-815e-37c58cdc0bda.pdf
S. Auliana, B. R. S. Permana, M. Darip, and S. C. Roy, “FuelGuard: Fuel Consumption Anomaly Detection and Visual Verification in Logistics Using Isolation Forest, CBIR, and OCR,” Jurnal Teknik Informatika (Jutif), vol. 6, no. 6, pp. 6017–6030, 2025, doi: 10.52436/1.jutif.2025.6.6.5276.
R. Guido, S. Ferrisi, D. Lofaro, and D. Conforti, “An Overview on the Advancements of Support Vector Machine Models in Healthcare Applications: A Review,” Information, vol. 15, no. 4, p. 235, Apr. 2024, doi: 10.3390/info15040235.
“(3) Streamlit: Transforming Data Analysis Scripts into Powerful Web Applications.” Accessed: Mar. 01, 2026. [Online]. Available: https://www.academia.edu/128116333/Streamlit_Transforming_Data_Analysis_Scripts_into_Powerful_Web_Applications
W. Rizki and M. Darip, “Penggunaan Algoritma Support Vector Machine Untuk mendeteksi Anomali Aktivitas Pengguna Pada Sistem Informasi Keuangan PT. Digidokat Indonesia,” JATI (Jurnal Mahasiswa Teknik Informatika), vol. 9, no. 3, Art. no. 3, May 2025, doi: 10.36040/jati.v9i3.13385.
A. Karim and A. Ernawati, “Uncovering Smartphone Brand Strategies through Specification-Based Clustering and Classification,” Buletin Ilmiah Informatika Teknologi, vol. 4, no. 1, pp. 24–32, Oct. 2025, doi: 10.58369/biit.v2i3.167.
Copyright (c) 2026 Mochammad Darip, Asep Sapaatullah, Rahmat Rahmat

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


.png)
.png)


