Analisis Komparasi Algoritma SVM, Random Forest dan MLP-NN Untuk Klasifikasi Intrusi Perimeter Berbasis Getaran

Authors

  • Regi Saputra Universitas Widyatama
  • Ari Purno Wahyu Wibowo Universitas Widyatama

DOI:

https://doi.org/10.28926/briliant.v11i1.2285

Keywords:

Intrusion, Machine Learning, MLP-NN, Random Forest, SVM

Abstract

The need for perimeter security systems is increasingly important in facing the increasing risk of intrusion to various infrastructures. This study aims to compare the performance of the Support Vector Machine (SVM), Random Forest, and Multi-Layers Perceptron Neural Network (MPL-NN) classification algorithms in separating intrusion and non-intrusion data classes recorded in the SW-420 vibration sensor installed on the perimeter fence. The Message Queuing Telemetry Transport (MQTT) communication protocol is used to connect the sensor to the program that records the dataset. Data collection is carried out through simulations of various vibration scenarios, such as intrusion attempts (intrusion) and environmental disturbances (non-intrusion). Normalization and label encoding techniques are applied to help the algorithm read important features in each data point. The results of the study show that of the three algorithms, Random Forest has a higher accuracy value with a value of 97% followed by the MLP-NN Tanh activation algorithm with an accuracy value of 93%. While the SVM algorithm with the RBF kernel has a value of 90.5%. This means that the Random Forest algorithm has good performance in categorizing vibrations.

References

Abdulrahman Safar, A., Salih, D. M., & Murshid, A. M. (2023). Pattern recognition using the multi-layer perceptron (MLP) for medical disease: A survey. Int. J. Nonlinear Anal. Appl, 14, 2008–6822. https://doi.org/10.22075/ijnaa.2022.7114

Alamsyah, S. N., Wery Melisa, Sari, O., Mutia Raudhatul Zahra, Muhammad Yuliansyah Putra, Zafran Afif, Shalih Muhammad Abdul Azhim, Yuliza, E., & Ekawita, R. (2023). Distance Range Test of SW-420 Sensor-Based Vibration Detection System. Jurnal Kumparan Fisika, 6(3), 177–184. https://doi.org/10.33369/jkf.6.3.177-184

Aryo Anggoro, D., & Permatasari, D. (2023). Performance Comparison of the Kernels of Support Vector Machine Algorithm for Diabetes Mellitus Classification. IJACSA) International Journal of Advanced Computer Science and Applications, 14(2), 215. www.ijacsa.thesai.org

Breiman, L. (2001). Random Forests (Vol. 45). https://doi.org/https://doi.org/10.1023/A:1010933404324

Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., & Wirth, R. (2000). CRISP-DM 1.0 Step-by-step Data Mining Guide .

Chicco, D., & Jurman, G. (2020). The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genomics, 21(1). https://doi.org/10.1186/s12864-019-6413-7

de Amorim, L. B. V., Cavalcanti, G. D. C., & Cruz, R. M. O. (2022). The choice of scaling technique matters for classification performance. https://doi.org/10.1016/j.asoc.2022.109924

Elkhadir, Z., & Achkari Begdouri, M. (2025). Enhancing internet of things attack detection using principal component analysis and kernel principal component analysis with cosine distance and sigmoid kernel. International Journal of Electrical and Computer Engineering (IJECE), 15(1), 1099. https://doi.org/10.11591/ijece.v15i1.pp1099-1108

Ghazali, M. H. M., & Rahiman, W. (2022). Vibration-Based Fault Detection in Drone Using Artificial Intelligence. IEEE Sensors Journal, 22(9), 8439–8448. https://doi.org/10.1109/JSEN.2022.3163401

Hairatunnisa, H., Nugroho, H. A., & Margiono, R. (2021). Analisis Kinerja Protokol MQTT dan HTTP Pada Akuisisi Data Magnet Berbasis Internet of Things. Jurnal Ilmiah Informatika, 6(2), 71–80. https://doi.org/10.35316/jimi.v6i2.1351

Hassan, I. H., Abdullahi, M., Aliyu, M. M., Yusuf, S. A., & Abdulrahim, A. (2022). An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intelligent Systems with Applications, 16. https://doi.org/10.1016/j.iswa.2022.200114

Herdian, C., Kamila, A., & Agung Musa Budidarma, I. G. (2024). Studi Kasus Feature Engineering Untuk Data Teks: Perbandingan Label Encoding dan One-Hot Encoding Pada Metode Linear Regresi. Technologia : Jurnal Ilmiah, 15(1), 93. https://doi.org/10.31602/tji.v15i1.13457

Intan, P. A., Ardhia, I. C., & Sri, C. K. A. (2024). Klasifikasi Penyakit Stunting Menggunakan Algoritma Multi-Layer Perceptron. Journal MIND Journal | ISSN, 9(1), 52–63. https://doi.org/10.26760/mindjournal.v9i1.52-63

Jasman, T. Z., Hasmin, E., Sunardi, Susanto, C., & Musu, W. (2022). Perbandingan Logistic Regression, Random Forest, dan Perceptron pada Klasifikasi Pasien Gagal Jantung. CSRID (Computer Science Research and Its Development Journal), 14(3), 271–286. https://doi.org/10.22303/csrid.14.3.2022.271-286

Khan, M. A., Khan, M. A., Jan, S. U., Ahmad, J., Jamal, S. S., Shah, A. A., Pitropakis, N., & Buchanan, W. J. (2021). A deep learning-based intrusion detection system for mqtt enabled iot. In Sensors (Vol. 21, Issue 21). MDPI. https://doi.org/10.3390/s21217016

Li, K., Zhen, Y., Li, P., Hu, X., & Yang, L. (2025). Optical Fiber Vibration Signal Recognition Based on the EMD Algorithm and CNN-LSTM. Sensors, 25(7), 2016. https://doi.org/10.3390/s25072016

Lohani, D., Crispim-Junior, C., Barthélemy, Q., Bertrand, S., Robinault, L., & Rodet, L. T. (2022). Perimeter Intrusion Detection by Video Surveillance: A Survey. In Sensors (Vol. 22, Issue 9). MDPI. https://doi.org/10.3390/s22093601

Mi, Q., Yu, H., Xiao, Q., & Wu, H. (2021). Intrusion behavior classification method applied in a perimeter security monitoring system. Optics Express, 29(6), 8592. https://doi.org/10.1364/oe.415929

Nur Fauzi, N. P., Khomsah, S., & Putra Wicaksono, A. D. (2025). Penerapan Feature Engineering dan Hyperparameter Tuning untuk Meningkatkan Akurasi Model Random Forest pada Klasifikasi Risiko Kredit. Jurnal Teknologi Informasi Dan Ilmu Komputer, 12(2), 251–262. https://doi.org/10.25126/jtiik.2025128472

Pitafi, S., Anwar, T., Widia, I. D. M., Yimwadsana, B., & Pitafi, S. (2023). Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security. IEEE Access, 11, 106954–106966. https://doi.org/10.1109/ACCESS.2023.3318600

Popescu, M.-C., & Balas, V. E. (2009). Multilayer Perceptron and Neural Networks. WSEAS Transactions on Circuits and Systems, 8(7), 579–588.

Prakoso, C., & Hermawan, A. (2023). Perbandingan Model Machine Learning dalam Analisis Sentimen Ulasan Pengunjung Keraton Yogyakarta pada Google Maps. Kajian Ilmiah Informatika Dan Komputer, 4(3), 1292–1302. https://doi.org/10.30865/klik.v4i3.1419

Putro, I. H. (2024). Performance Comparison of SVM Kernels for Intrusion Detection System Using UNSW-NB15 Dataset. Jurnal Teknik Elektro, 17(2).

Rizki, Z., Lbs, F., Sylvia, T., & Nasution, D. (2024). The Design Of Perimeter Intrusion Detection System (PIDS) Surveillance Alarm Using USB Webcam And Artificial Intelligence Based On Web And Telegram Bot At Medan Aviation Polytechnic. Jurnal Scientia, 13. https://doi.org/10.58471/scientia.v13i04

Rodrigues, Á. L., Gontijo, F., Niquini, F., Emilio, W., & Moreno, G. (2025). Spatial cross-validation for Machine Learning model estimates. ResearchGate. https://doi.org/10.13140/RG.2.2.34161.19047

Susetyoko, R., Purwantini, E., Nur Iman, B., & Satriyanto, E. (2023). An Improved Accuracy of Multiclass Random Forest Classifier with Continuous Attribute Transformation Using Random Percentile Generation. 13(3). https://doi.org/https://doi.org/10.18517/ijaseit.13.3.18379

Zhang, F., Zhen, P., Jing, D., Tang, X., Chen, H. B., & Yan, J. (2022). SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection. IEICE Transactions on Information and Systems, E105D(5), 1024–1038. https://doi.org/10.1587/transinf.2021EDP7184

Published

22-02-2026

Issue

Section

Engineering and Technology