Intrusion Detection System Analysis to Improve Computer Network Security
DOI:
https://doi.org/10.59934/jaiea.v4i3.1036Keywords:
Intrusion detection systems, network security, artificial intelligence, machine learning, cybersecurityAbstract
This study analyzes intrusion detection systems (IDS) as a vital component in the security of modern computer networks that face increasingly complex cyber threats. Through the Systematic Literature Review approach of 478 publications during 2019-2024, it was found that the CNN-LSTM hybrid model achieved a detection accuracy of 97.3% on the NSL-KDD dataset, far surpassing conventional signature-based methods. The implementation of anomaly-based IDS on Indonesian government infrastructure has identified 45% of attacks that are not detected by traditional solutions, with a reduction in incident response time from 24 hours to 3.5 hours. Federated learning technology for heterogeneous IoT environments increases detection accuracy by 18.7% while reducing network load by up to 76%, while integration with blockchain reduces incident investigation time by 67%. Explainable AI-based frameworks increase security team confidence by 43% and reduce alert fatigue by 38%. The reinforcement learning-based IDS system showed autonomous adaptability with an increase in F1-score from 0.87 to 0.96 without manual intervention. The cost-benefit analysis shows a positive return on Security Investment with an average breakeven point achieved in 14-19 months. This research provides the foundation for the development of an adaptive, contextual, and integrated intrusion detection system to deal with the evolution of contemporary cyber threats.
Keywords: Intrusion detection systems, network security, artificial intellige
Downloads
References
N. Made, F. D. Svari, and K. D. Arlinayanti, "Changing the Paradigm of Education Through the Utilization of Technology in the Global Era," Jayapangus Press Metta J. Multidisciplinary Science, vol. 4, pp. 50–63, 2024, [Online]. Available: https://jayapanguspress.penerbit.org/index.php/metta
E. Soesanto, A. Romadhon, B. Dwi Mardika, and M. Fahmi Setiawan, "Cyber Security Analysis and Improvement: A Case Study of Threats and Solutions in the Digital Environment to Secure Vital Objects and Files," SAMMAJIVA J. Researcher. Business and Management., vol. 1, no. 2, p. 186, 2023.
B. Arianto, "The Covid-19 Pandemic and Digital Cultural Transformation in Indonesia," Titian J. Ilmu Hum., vol. 5, no. 2, pp. 233–250, 2021, doi: 10.22437/titian.v5i2.15309.
St. Augustine et al., "Literature Review : The Development of Edge Computing in Supporting IoT," vol. 7, no. 1, pp. 36–43, 2025, doi: 10.55642/eatij.v7i01.969.
D. P. Amanda and E. D. Absharina, "IMPLEMENTATION OF AI-POWERED INTRUSION DETECTION SYSTEMS TO DETECT THREATS," vol. 10, no. 1, 2025.
M. R. Wijaya, "Intrusion Detection System (IDS) Model Innovation using Double Layer Gated Recurrent Unit (GRU) with Fusion-Based Features," vol. 12, no. 1, pp. 10–21, 2025.
S. N. Adzimi, H. A. Alfasih, F. N. G. Ramadhan, S. N. Neyman, and A. Setiawan, "Implementation of Firewall Configuration and Intrusion Detection System using Debian," J. Internet Softw. Eng., vol. 1, no. 4, p. 12, 2024, doi: 10.47134/pjise.v1i4.2681.
J. N. Sibarani, D. R. Sirait, and S. S. Ramadhanti, "Intrusion Detection Systems on Bot-IoT Datasets Using Machine Learning Algorithms," J. Masy. Inform., vol. 14, no. 1, pp. 38–52, 2023, doi: 10.14710/jmasif.14.1.49721.
G. M. G. Bororing, "Development of Machine Learning Algorithms to Detect Anomalies in Computer Networks," J. Rev. Educator. and..., vol. 7, pp. 1361–1368, 2024, [Online]. Available: http://journal.universitaspahlawan.ac.id/index.php/jrpp/article/view/25176%0Ahttp://journal.universitaspahlawan.ac.id/index.php/jrpp/article/download/25176/17529
D. Widya, E. Simatangkir, U. N. Semarang, U. N. Semarang, N. S. Faliha, and U. N. Semarang, "CYBER SECURITY IN BANKING AND CHALLENGES," vol. 2, no. 1, pp. 33–42, 2025.
M. Taufik, M. S. Aziz, and A. Fitriana, "Hybrid Explainable AI ( XAI ) Framework for Detecting Adversarial Attacks in Cyber-Physical Systems," vol. 4, no. 1, pp. 157–171, 2025.
T. Yuliswar et al., "OPTIMIZATION OF INTRUSION DETECTION SYSTEM WITH MACHINE LEARNING FOR DETECTING DISTRIBUTED ATTACKS ON SERVER MACHINE LEARNING FOR ATTACK DETECTION," vol. 10, no. 1, pp. 367–376, 2025.
I. Elan Maulani and A. Faisal Umam, "Evaluation of the Effectiveness of Intrusion Detection Systems in Ensuring Network Security," J. Sos. Technology., vol. 3, no. 8, pp. 662–667, 2023, doi: 10.59188/jurnalsostech.v3i8.907.
R. K. Abdullah, M. T. Fudhail, S. Mujahidin, P. Studi, I. Major, and T. Information, "The use of Snort and Fail2ban as IDS to overcome Brute Force Attack with Telegram notification : Case study at XYZ Ins," vol. 12, no. 3, pp. 530–542, 2024, doi: 10.26418/justin.v12i3.79617.
N. Andelita, I. W. Sudiarta, and D. W. Kurniawidi, "Application of Quantum Variational Quantum Eigensolver (VQE) Algorithm to Determine the Elementary State Energy of Helium Dimers," J. Fis., vol. 11, no. 2, pp. 53–59, 2021, doi: 10.15294/jf.v11i2.30192.
Y. M. Saputra, G. Alfian, and M. Q. H. Octava, "Designing Federated Learning Based on Homomorphic Encryption for Internet of Things Devices," J. Internet Softw. Eng., vol. 4, no. 1, pp. 1–5, 2023, doi: 10.22146/jise.v4i1.6378.
R. Setiawan, "Integration of Blockchain Technology for Secure Access Control in Distributed Databases," vol. 3, no. 2, pp. 379–384, 2025.
E. Risyad, M. Data, and E. S. Pramukantoro, "Comparison of the Performance of Intrusion Detection System (IDS) Snort and Suricata in Detecting TCP SYN Flood Attacks," J. Pengemb. Technology. Inf. and Computing Science., vol. 2, no. 9, pp. 2615–2624, 2018.
M. R. Widianto and F. A. Salsabitah, "Improving Network Security in an Approach to Modern Cyber Threats," vol. 5, no. 2, pp. 321–334, 2024.
F. A. Febian and W. N. Alimyaningtias, "COMPARATIVE ANALYSIS OF SIGNATURE-BASED AND ANOMALY-BASED DETECTION TECHNIQUES IN SNORT AND ZEEK," vol. 1, no. 2, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.