Analisis Komparasi Algoritma Random Forest dan Support Vector Machine untuk Deteksi Intrusi Jaringan
DOI:
https://doi.org/10.29103/techsi.v16i2.25811Abstract
Meningkatnya kompleksitas serangan siber menuntut adanya sistem keamanan jaringan yang adaptif dan efisien. Intrusion Detection System (IDS) tradisional seringkali memiliki keterbatasan dalam mengenali pola serangan baru. Penelitian ini bertujuan untuk mengevaluasi kinerja dua algoritma Machine Learning, yaitu Random Forest (RF) dan Support Vector Machine (SVM), dalam mengklasifikasikan trafik jaringan normal dan serangan. Eksperimen dilakukan menggunakan dataset NSL-KDD dengan melibatkan seluruh 41 fitur melalui tahapan preprocessing, normalisasi, dan validasi data dengan rasio 80:20. Hasil pengujian menunjukkan bahwa algoritma Random Forest mengungguli SVM dengan tingkat akurasi mencapai 99.78%, presisi 1.00, dan recall 1.00. Sebaliknya, SVM mencatatkan akurasi sebesar 99.03%. Selain unggul dalam akurasi, Random Forest terbukti lebih efisien dengan waktu pelatihan (training time) rata-rata 3.72 detik, hampir dua kali lebih cepat dibandingkan SVM yang membutuhkan 6.61 detik. Berdasarkan hasil tersebut, Random Forest direkomendasikan sebagai algoritma yang lebih efektif untuk implementasi IDS pada lingkungan yang membutuhkan respons waktu nyata (real-time).
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Hasanal Fachri Satia Simbolon, Ade Linhar P, Rafi Septiawan Putra, Fahmi Izhari

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the journal right of first publication and this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 that allows others to share the work with an acknowledgement of the works authorship and initial publication in this journal.
All articles in this journal may be disseminated by listing valid sources and the title of the article should not be omitted. The content of the article is liable to the author.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
In the dissemination of articles by the author must declare the TECHSI Journal as the first party to publish the article.
