Brute-Force Attack Detection on Computer Networks Using Artificial Neural Network

Authors

  • Ikhtiar Adli Wicaksono Universitas Bina Sarana Informatika
  • Muhammad Iqbal Maulana Universitas Bina Sarana Informatika
  • Bagus Nurrahman Universitas Bina Sarana Informatika
  • Syifa Nur Rakhmah Universitas Bina Sarana Informatika
  • Findi Ayu Sariasih Universitas Bina Sarana Informatika
  • Imam Sutoyo Universitas Bina Sarana Informatika

DOI:

https://doi.org/10.59934/jaiea.v5i2.1804

Keywords:

Artificial Neural Network, Brute-force Attack, Classification, Machine Learning, Network Traffic

Abstract

This research aims to develop a brute-force attack detection system on computer networks using the Artificial Neural Network (ANN) algorithm. This security problem is crucial, especially in the banking sector because it can threaten login systems and sensitive customer data. The research methods include data cleansing, feature selection using the Wrapper method, ANN model training, and performance evaluation using datasets from Kaggle which include four classes of network traffic, namely Normal, Brute-force FTP, Brute-force SSH, and Web Attack Brute-force. The test results showed that the ANN model achieved an accuracy of 95%, precision of 91%, and the best performance in the Brute-force FTP class with an accuracy of 98.3%. This system has proven to be effective in detecting brute-force attack patterns and can improve the security of banking networks adaptively. This research broadens the insights of the application of ANN in network security and provides a basis for the development of systems that are more responsive to cyber threats.

Downloads

Download data is not yet available.

Author Biographies

Muhammad Iqbal Maulana, Universitas Bina Sarana Informatika

Program Studi Informatika, Fakultas Teknik dan Informatika, Universitas Bina Sarana Informatika.

Bagus Nurrahman, Universitas Bina Sarana Informatika

Program Studi Informatika, Fakultas Teknik dan Informatika, Universitas Bina Sarana Informatika

Syifa Nur Rakhmah, Universitas Bina Sarana Informatika

Program Studi Teknologi Informasi, Fakultas Teknik dan Informatika, Universitas Bina Sarana Informatika

Findi Ayu Sariasih, Universitas Bina Sarana Informatika

Program Studi Informatika, Fakultas Teknik dan Informatika, Universitas Bina Sarana Informatika

Imam Sutoyo, Universitas Bina Sarana Informatika

Program Studi Teknologi Informasi, Fakultas Teknik dan Informatika, Universitas Bina Sarana Informatika

References

Ardiansyah, A. A. M. Suradi, and W. Saputra, “Strategi Keamanan Router MikroTik: Deteksi dan Mitigasi Serangan Brute Force Berbasis Scripting,” JUKI J. Komput. dan Inform., vol. 7, pp. 12–19, 2025.

D. Afifah, “Perlindungan Konsumen di Sektor Jasa Keuangan pada Kasus Serangan Siber Ransomware yang Menimpa Perbankan,” vol. 6, no. November, pp. 9318–9323, 2023.

K. Mubarok and M. A. Romli, “Implementation of Rule Based Method in Detecting Brute Force Attacks on Owncloud Implementasi Metode Rule Based dalam Mendeteksi Serangan Brute Force pada Owncloud,” vol. 5, no. January, pp. 159–167, 2025.

Abdul-waliyyu Bello, Idris Wonuola, Callistus Obunadike, Anastesia Izundu, and Jacinta Izundu, “Assessing the impact of cybersecurity incidents on financial losses and user exposure in the global financial sector (2015-2024),” Int. J. Sci. Res. Arch., vol. 16, no. 1, pp. 489–504, 2025, doi: 10.30574/ijsra.2025.16.1.2037.

N. Alotibi and M. Alshammari, “Deep Learning-based Intrusion Detection: A Novel Approach for Identifying Brute-Force Attacks on FTP and SSH Protocol,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 6, pp. 107–111, 2023, doi: 10.14569/IJACSA.2023.0140612.

S. Munawarah and E. A. Winanto, “Deteksi Serangan DDoS SYN Flood Pada Jaringan Internet of Things ( IoT ) Menggunakan Metode Deep Neural Network ( DNN ) Jurnal Informatika Dan Rekayasa Komputer ( JAKAKOM ),” vol. 4, no. April, pp. 982–990, 2024.

M. L. Ali, K. Thakur, S. Schmeelk, J. Debello, and D. Dragos, “Deep Learning vs. Machine Learning for Intrusion Detection in Computer Networks: A Comparative Study,” Appl. Sci., vol. 15, no. 4, pp. 1–19, 2025, doi: 10.3390/app15041903.

N. Abbas, A. M. Gravell, and G. B. Wills, “Historical roots of agile methods: Where did ‘Agile thinking’ come from?,” Lect. Notes Bus. Inf. Process., vol. 9 LNBIP, pp. 94–103, 2008, doi: 10.1007/978-3-540-68255-4_10.

V. Chandani and R. S. Wahono, “Komparasi Algoritma Klasifikasi Machine Learning Dan Feature Selection pada Analisis Sentimen Review Film,” J. Intell. Syst., vol. 1, no. 1, pp. 55–59, 2015.

N. Ansari, “A survey on feature selection techniques using evolutionary algorithms,” Iraqi J. Sci., vol. 62, no. 8, pp. 2796–2812, 2021, doi: 10.24996/ijs.2021.62.8.32.

Downloads

Published

2026-02-15

How to Cite

Ikhtiar Adli Wicaksono, Muhammad Iqbal Maulana, Bagus Nurrahman, Syifa Nur Rakhmah, Findi Ayu Sariasih, & Imam Sutoyo. (2026). Brute-Force Attack Detection on Computer Networks Using Artificial Neural Network. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 5(2), 2173–2178. https://doi.org/10.59934/jaiea.v5i2.1804