Cyber intrusion detection model using deep learning based on augmented image-based feature construction
DOI:
https://doi.org/10.31571/saintek.v15i1.10499Keywords:
Network Intrusion Detection, CNN, LM-IGTD, HoNG, NSL-KDDAbstract
Network intrusion detection remains a critical challenge in cybersecurity, particularly due to the increasing volume and complexity of network traffic. To address this issue, this study develops a deep learning framework that transforms tabular NSL-KDD data into image representations using the Lightweight Multi-feature Image Generator for Tabular Data (LM-IGTD). In addition, Homogeneous Noise Generation (HoNG) is applied to enrich feature diversity prior to processing. The transformed data are then classified using a Convolutional Neural Network (CNN) under a binary classification scheme to distinguish between normal and attack activities. Experimental results on the KDDTest+ dataset show that the proposed approach achieves an accuracy of 81.81%, an F1-score of 81.51%, and a ROC-AUC of 95.11%. The results indicate that LM-IGTD significantly contributes to improving the model’s ability to distinguish between classes, particularly in terms of ROC-AUC, while HoNG enhances classification performance in terms of accuracy and F1-score. However, a trade-off is observed between improved classification accuracy and the model’s probability ranking capability. Overall, these findings highlight that LM-IGTD provides an effective feature representation strategy, while HoNG offers a complementary contribution depending on the evaluation metric prioritized.
Downloads
References
Badan Siber dan Sandi Negara. (2024). Publikasi laporan tahunan monitoring keamanan siber. https://www.bsn.go.id/monitoring-keamanan-siber
Alenizy, H. A., & Berri, J. (2025). Transforming tabular data into images via enhanced spatial relationships for CNN processing. Scientific Reports, 15(1). https://doi.org/10.1038/s41598-025-01568-0
Alsaedi, M., Ghaleb, F. A., Saeed, F., Ahmad, J., & Alasli, M. (2024). Multi-modal features representation-based convolutional neural network model for malicious website detection. IEEE Access, 12, 7271–7284. https://doi.org/10.1109/ACCESS.2023.3348071
Ambarwari, A., Adrian, Q. J., & Herdiyeni, Y. (2020). Analisis pengaruh data scaling terhadap performa algoritme machine learning untuk identifikasi tanaman. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 1(3), 117–122.
Aslam, M., Tufail, A., Apong, R., Silva, L., & Taqi Raza, M. (2024). Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective. IEEE Access, 1. https://doi.org/10.1109/ACCESS.2024.3394848
Bayu Sasongko, T., & Amrullah, A. (2023). Analisis efek augmentasi dataset dan fine tune pada algoritma pre-trained convolutional neural network (CNN). Jurnal Teknologi Informasi dan Ilmu Komputer, 10(4), 763–768. https://doi.org/10.25126/jtiik.2023106583
Golubev, S., Novikova, E., & Fedorchenko, E. (2022). Image-based approach to intrusion detection in cyber-physical objects. Information, 13(12). https://doi.org/10.3390/info13120553
Gómez-Martínez, V., Lara-Abelenda, F. J., Peiro-Corbacho, P., Chushig-Muzo, D., Granja, C., & Soguero-Ruiz, C. (2024). LM-IGTD: A 2D image generator for low-dimensional and mixed-type tabular data to leverage the potential of convolutional neural networks. arXiv. https://arxiv.org/abs/2406.14566
Gorle, R., & Guttavelli, A. (2025). Enhanced image tampering detection using error level analysis and a CNN. Engineering, Technology and Applied Science Research, 15(1), 19683–19689. https://doi.org/10.48084/etasr.9593
Karahan, O., Ataşlar-Ayyıldız, B., & Ayyıldız, P. (2025). Network intrusion detection system using a hybrid deep learning model with swarm intelligence-based hyperparameter optimization. The Journal of Supercomputing, 81(15), 1346. https://doi.org/10.1007/s11227-025-07802-w
Lara-Abelenda, F. J., Chushig-Muzo, D., Peiro-Corbacho, P., Gómez-Martínez, V., Wägner, A. M., Granja, C., & Soguero-Ruiz, C. (2025). Transfer learning for a tabular-to-image approach: A case study for cardiovascular disease prediction. Journal of Biomedical Informatics, 165, 104821. https://doi.org/10.1016/j.jbi.2025.104821
Liu, X., Zhu, S., Yang, F., & Liang, S. (2022). Research on unsupervised anomaly data detection method based on improved automatic encoder and Gaussian mixture model. Journal of Cloud Computing, 11(1), 58. https://doi.org/10.1186/s13677-022-00328-z
Malhotra, L., Bhushan, B., & Singh, R. (2021). Artificial intelligence and deep learning-based solutions to enhance cyber security. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3833311
Phulre, A. K., Jain, S., & Jain, G. (2024). Evaluating security enhancement through machine learning approaches for anomaly-based intrusion detection systems. In 2024 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS) (pp. 1–5). https://doi.org/10.1109/SCEECS61402.2024.10482161
Saputra, F. H., Ilham, I., Rizal, M., Wisda, W., Wanita, F., Mursalim, M., & Fadillah, A. (2025). Enhancing intrusion detection using random forest and SMOTE on the NSL-KDD dataset. Journal of System and Computer Engineering (JSCE), 6(3), 240–247. https://doi.org/10.61628/jsce.v6i3.2056
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD Cup 99 data set. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (pp. 1–6). https://doi.org/10.1109/CISDA.2009.5356528
Wu, Y., Zou, B., & Cao, Y. (2024). Current status, challenges, and future trends of deep learning-based intrusion detection models. Journal of Imaging, 10(10). https://doi.org/10.3390/jimaging10100254
Yu, C., Han, R., Song, M., Liu, C., & Chang, C. I. (2020). A simplified 2D-3D CNN architecture for hyperspectral image classification based on spatial-spectral fusion. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 13, 2485–2501. https://doi.org/10.1109/JSTARS.2020.2983224
Zhao, X., Leng, X., Wang, L., & Wang, N. (2024). Research on fine-tuning optimization strategies for large language models in tabular data processing. Biomimetics, 9(11). https://doi.org/10.3390/biomimetics9110708
Zhu, J. (2024). Research on software vulnerability detection methods based on deep learning. Journal of Computing and Electronic Information Management, 14(3), 2413–1660.
Zhu, Y., Brettin, T., Xia, F., Partin, A., Shukla, M., Yoo, H., Evrard, Y. A., Doroshow, J. H., & Stevens, R. L. (2021). Converting tabular data into images for deep learning with convolutional neural networks. Scientific Reports, 11(1), 11325. https://doi.org/10.1038/s41598-021-90923-y
Zou, D., Wang, S., Xu, S., Li, Z., & Jin, H. (2020). VulDeePecker: A deep learning-based system for multiclass vulnerability detection. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2019.2942930
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Mauludil Asri M. Cane, Kusrini Kusrini, Melwin Syafrizal

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal. Please also carefully read Jurnal Pendidikan Informatika dan Sains Posting Your Article Policy at http://journal.ikippgriptk.ac.id/index.php/saintek/about/submissions#onlineSubmissions
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with Jurnal Pendidikan Informatika dan Sains agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Download: 18
