Analisis Log Server dengan Data Mining untuk Deteksi Aktifitas Malicious

Authors

  • Muhammad Anis Al Hilmi Universitas Swadaya Gunung Jati
  • Kurnia Adi Cahyanto Universitas Diponegoro
  • Azhar Al Afghani Universitas Swadaya Gunung Jati
  • Badrudin Hadibrata Universitas Swadaya Gunung Jati

DOI:

https://doi.org/10.53842/juki.v8i1.2318

Keywords:

log server, data mining, SVM, intrusion detection, malicious activity

Abstract

Web server security is a primary concern amid the rising wave of cyber threats. Every user interaction with a web application is recorded in server logs, which contain valuable information including IP addresses, request methods, response status codes, and data sizes. This study leverages server log data from January to July 2019 collected from an educational institution to detect malicious activities using a data mining approach. After preprocessing and rule-based labeling into three classes Safe, Suspicious, and Dangerous  dimensionality reduction was applied via Linear Discriminant Analysis (LDA) before classification using five algorithms: SVM-RBF, SVM-Linear, SVM-Polynomial, K-NN via GridSearch, and Decision Tree. Results show that SVM-RBF delivers the most stable performance, achieving a training accuracy of 88% and testing accuracy of 86%. However, class imbalance affects recall scores for certain categories. This study confirms the effectiveness of combining LDA and SVM-RBF as a basis for log-based intrusion detection systems, while also highlighting the need for further development through data balancing techniques and additional feature engineering.

Downloads

Download data is not yet available.

References

M. Khan, “Advanced System Log Analyzer for Anomaly Detection and Cyber Forensic Investigations Using LSTM and Transformer Networks,” Journal of Cloud Computing, vol. 14, no. 1, p. 60, 2025, doi: 10.1186/s13677-025-00789-y.

A. R. Nisa, A. D. Wijayanto, A. P. J. Priana, and A. Setiawan, “Analisis Log Server untuk Mendeteksi Serangan DDoS pada Keamanan Jaringan di Website,” Journal of Internet and Software Engineering, vol. 1, no. 3, p. 17, 2024, doi: 10.47134/pjise.v1i3.2612.

A. H. Shah, D. Pasha, E. Habib Zadeh, and S. Konur, “Automated Log Analysis and Anomaly Detection Using Machine Learning,” in Fuzzy Systems and Data Mining VIII, vol. 358, in Frontiers in Artificial Intelligence and Applications, vol. 358. , IOS Press, 2022, pp. 137–147. doi: 10.3233/FAIA220378.

I. Khaerani and L. Budi Handoko, “IMPLEMENTASI DAN ANALISA HASIL DATA MINING UNTUK KLASIFIKASI SERANGAN PADA INTRUSION DETECTION SYSTEM (IDS) DENGAN ALGORITMA C4.5,” 2015.

K. A. Cahyanto, M. Anis, A. Hilmi, and M. Mustamiin, “PENGUJIAN RULE-BASED PADA DATASET LOG SERVER MENGGUNAKAN SUPPORT VECTOR MACHINE BERBASIS LINEAR DISCRIMINAT ANALYSIS UNTUK DETEKSI MALICIOUS ACTIVITY,” vol. 9, no. 2, pp. 245–254, 2022, doi: 10.25126/jtiik.202294107.

A. R. Saputro, Nurchim, and V. Atina, “Identifikasi Anomali Keamanan Server Nginx Menggunakan Algoritma Isolation Forest,” JATI (Jurnal Mahasiswa Teknik Informatika), vol. 9, no. 2, 2025, doi: 10.36040/jati.v9i2.13110.

S. P. Thirimanne, L. Jayawardana, L. Yasakethu, P. Liyanaarachchi, and C. Hewage, “Deep Neural Network Based Real-Time Intrusion Detection System,” SN Comput. Sci., vol. 3, no. 2, p. 145, 2022, doi: 10.1007/s42979-022-01031-1.

M. Injadat, A. Moubayed, A. B. Nassif, and A. Shami, “Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1803–1816, 2021, doi: 10.1109/TNSM.2020.3014929.

H. Hindy et al., “A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 104650–104675, 2020, doi: 10.1109/ACCESS.2020.3000179.

M. Landauer, F. Skopik, M. Wurzenberger, W. Hotwagner, and A. Rauber, “A Framework for Cyber Threat Intelligence Extraction from Raw Log Data,” in 2019 IEEE International Conference on Big Data (Big Data), IEEE, 2019, p. 3. doi: 10.1109/BigData47090.2019.9006328.

H. Kaur, H. S. Pannu, and A. K. Malhi, “A Systematic Review on Imbalanced Data Challenges in Machine Learning: Applications and Solutions,” ACM Comput. Surv., vol. 52, no. 4, pp. 1–36, 2019, doi: 10.1145/3343440.

M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, “A Survey of Network-based Intrusion Detection Data Sets,” Comput. Secur., vol. 86, pp. 147–167, 2019, doi: 10.1016/j.cose.2019.06.005.

A. Pamuji, “Prediksi Otorisasi Pengguna Sistem Berkas pada Algoritma Klasifikasi dengan Teknik Naïve Bayes,” Infomatek: Jurnal Informatika, Manajemen dan Teknologi, vol. 24, no. 1, 2022, doi: 10.23969/infomatek.v24i1.4604.

I. A. S. Dewi Paramitha, G. M. A. Sasmita, and I. M. S. Raharja, “Analisis Data Log IDS Snort dengan Algoritma Clustering Fuzzy C-Means,” Majalah Ilmiah Teknologi Elektro, vol. 19, no. 1, pp. 95–100, 2020, doi: 10.24843/MITE.2020.v19i01.P14.

X. Xu, J. Li, Y. Yang, and F. Shen, “Toward Effective Intrusion Detection Using Log-Cosh Conditional Variational Autoencoder,” IEEE Internet Things J., vol. 8, no. 8, pp. 6187–6196, 2021, doi: 10.1109/JIOT.2020.3034621.

M. Landauer, M. Wurzenberger, F. Skopik, G. Settanni, and P. Filzmoser, “Dynamic Log File Analysis: An Unsupervised Cluster Evolution Approach for Anomaly Detection,” Comput. Secur., vol. 79, pp. 94–116, 2018, doi: 10.1016/j.cose.2018.08.009.

F. Nova, M. D. Pratama, and D. Prayama, “Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan DoS,” JITSI: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 3, no. 1, pp. 1–7, 2022, doi: 10.62527/jitsi.3.1.59.

R. S. Miani, G. D. G. Bernardo, G. W. Cassales, H. Senger, and E. R. de Faria, “A Survey of Data Stream-Based Intrusion Detection Systems,” IEEE Access, vol. 13, pp. 72953–72983, 2025, doi: 10.1109/ACCESS.2025.3561105.

Downloads

Published

2026-05-13

How to Cite

Hilmi, M. A. A., Cahyanto, K. A. ., Afghani, A. A. ., & Hadibrata, B. . (2026). Analisis Log Server dengan Data Mining untuk Deteksi Aktifitas Malicious. JUKI : Jurnal Komputer Dan Informatika, 8(1), 93–104. https://doi.org/10.53842/juki.v8i1.2318