Cyber intrusion detection model using deep learning based on augmented image-based feature construction

Authors

  • Mauludil Asri M. Cane AMIKOM Yogyakarta
  • Kusrini Kusrini Universitas AMIKOM Yogyakarta
  • Melwin Syafrizal Universitas AMIKOM Yogyakarta

DOI:

https://doi.org/10.31571/saintek.v15i1.10499

Keywords:

Network Intrusion Detection, CNN, LM-IGTD, HoNG, NSL-KDD

Abstract

Network intrusion detection remains a critical challenge in cybersecurity, particularly due to the increasing volume and complexity of network traffic. To address this issue, this study develops a deep learning framework that transforms tabular NSL-KDD data into image representations using the Lightweight Multi-feature Image Generator for Tabular Data (LM-IGTD). In addition, Homogeneous Noise Generation (HoNG) is applied to enrich feature diversity prior to processing. The transformed data are then classified using a Convolutional Neural Network (CNN) under a binary classification scheme to distinguish between normal and attack activities. Experimental results on the KDDTest+ dataset show that the proposed approach achieves an accuracy of 81.81%, an F1-score of 81.51%, and a ROC-AUC of 95.11%. The results indicate that LM-IGTD significantly contributes to improving the model’s ability to distinguish between classes, particularly in terms of ROC-AUC, while HoNG enhances classification performance in terms of accuracy and F1-score. However, a trade-off is observed between improved classification accuracy and the model’s probability ranking capability. Overall, these findings highlight that LM-IGTD provides an effective feature representation strategy, while HoNG offers a complementary contribution depending on the evaluation metric prioritized.

Downloads

Download data is not yet available.

References

Badan Siber dan Sandi Negara. (2024). Publikasi laporan tahunan monitoring keamanan siber. https://www.bsn.go.id/monitoring-keamanan-siber

Alenizy, H. A., & Berri, J. (2025). Transforming tabular data into images via enhanced spatial relationships for CNN processing. Scientific Reports, 15(1). https://doi.org/10.1038/s41598-025-01568-0

Alsaedi, M., Ghaleb, F. A., Saeed, F., Ahmad, J., & Alasli, M. (2024). Multi-modal features representation-based convolutional neural network model for malicious website detection. IEEE Access, 12, 7271–7284. https://doi.org/10.1109/ACCESS.2023.3348071

Ambarwari, A., Adrian, Q. J., & Herdiyeni, Y. (2020). Analisis pengaruh data scaling terhadap performa algoritme machine learning untuk identifikasi tanaman. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 1(3), 117–122.

Aslam, M., Tufail, A., Apong, R., Silva, L., & Taqi Raza, M. (2024). Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective. IEEE Access, 1. https://doi.org/10.1109/ACCESS.2024.3394848

Bayu Sasongko, T., & Amrullah, A. (2023). Analisis efek augmentasi dataset dan fine tune pada algoritma pre-trained convolutional neural network (CNN). Jurnal Teknologi Informasi dan Ilmu Komputer, 10(4), 763–768. https://doi.org/10.25126/jtiik.2023106583

Golubev, S., Novikova, E., & Fedorchenko, E. (2022). Image-based approach to intrusion detection in cyber-physical objects. Information, 13(12). https://doi.org/10.3390/info13120553

Gómez-Martínez, V., Lara-Abelenda, F. J., Peiro-Corbacho, P., Chushig-Muzo, D., Granja, C., & Soguero-Ruiz, C. (2024). LM-IGTD: A 2D image generator for low-dimensional and mixed-type tabular data to leverage the potential of convolutional neural networks. arXiv. https://arxiv.org/abs/2406.14566

Gorle, R., & Guttavelli, A. (2025). Enhanced image tampering detection using error level analysis and a CNN. Engineering, Technology and Applied Science Research, 15(1), 19683–19689. https://doi.org/10.48084/etasr.9593

Karahan, O., Ataşlar-Ayyıldız, B., & Ayyıldız, P. (2025). Network intrusion detection system using a hybrid deep learning model with swarm intelligence-based hyperparameter optimization. The Journal of Supercomputing, 81(15), 1346. https://doi.org/10.1007/s11227-025-07802-w

Lara-Abelenda, F. J., Chushig-Muzo, D., Peiro-Corbacho, P., Gómez-Martínez, V., Wägner, A. M., Granja, C., & Soguero-Ruiz, C. (2025). Transfer learning for a tabular-to-image approach: A case study for cardiovascular disease prediction. Journal of Biomedical Informatics, 165, 104821. https://doi.org/10.1016/j.jbi.2025.104821

Liu, X., Zhu, S., Yang, F., & Liang, S. (2022). Research on unsupervised anomaly data detection method based on improved automatic encoder and Gaussian mixture model. Journal of Cloud Computing, 11(1), 58. https://doi.org/10.1186/s13677-022-00328-z

Malhotra, L., Bhushan, B., & Singh, R. (2021). Artificial intelligence and deep learning-based solutions to enhance cyber security. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3833311

Phulre, A. K., Jain, S., & Jain, G. (2024). Evaluating security enhancement through machine learning approaches for anomaly-based intrusion detection systems. In 2024 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS) (pp. 1–5). https://doi.org/10.1109/SCEECS61402.2024.10482161

Saputra, F. H., Ilham, I., Rizal, M., Wisda, W., Wanita, F., Mursalim, M., & Fadillah, A. (2025). Enhancing intrusion detection using random forest and SMOTE on the NSL-KDD dataset. Journal of System and Computer Engineering (JSCE), 6(3), 240–247. https://doi.org/10.61628/jsce.v6i3.2056

Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD Cup 99 data set. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (pp. 1–6). https://doi.org/10.1109/CISDA.2009.5356528

Wu, Y., Zou, B., & Cao, Y. (2024). Current status, challenges, and future trends of deep learning-based intrusion detection models. Journal of Imaging, 10(10). https://doi.org/10.3390/jimaging10100254

Yu, C., Han, R., Song, M., Liu, C., & Chang, C. I. (2020). A simplified 2D-3D CNN architecture for hyperspectral image classification based on spatial-spectral fusion. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 13, 2485–2501. https://doi.org/10.1109/JSTARS.2020.2983224

Zhao, X., Leng, X., Wang, L., & Wang, N. (2024). Research on fine-tuning optimization strategies for large language models in tabular data processing. Biomimetics, 9(11). https://doi.org/10.3390/biomimetics9110708

Zhu, J. (2024). Research on software vulnerability detection methods based on deep learning. Journal of Computing and Electronic Information Management, 14(3), 2413–1660.

Zhu, Y., Brettin, T., Xia, F., Partin, A., Shukla, M., Yoo, H., Evrard, Y. A., Doroshow, J. H., & Stevens, R. L. (2021). Converting tabular data into images for deep learning with convolutional neural networks. Scientific Reports, 11(1), 11325. https://doi.org/10.1038/s41598-021-90923-y

Zou, D., Wang, S., Xu, S., Li, Z., & Jin, H. (2020). VulDeePecker: A deep learning-based system for multiclass vulnerability detection. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2019.2942930

Downloads

Published

2026-04-29

How to Cite

Cane, M. A. M., Kusrini, K., & Syafrizal, M. (2026). Cyber intrusion detection model using deep learning based on augmented image-based feature construction. Jurnal Pendidikan Informatika Dan Sains, 15(1), 16–30. https://doi.org/10.31571/saintek.v15i1.10499