Performance Evaluation of Random Forest and Isolation Forest Algorithms for Detecting Anomalies in SIAKAD Server Log Data

Authors

  • Ratih Department of Computer and Business, Cyber Security Engineering Program, Politeknik Negeri Cilacap, Cilacap, Indonesia
  • Abdul Hakim Prima Yuniarto Department of Electrical Engineering, Sekolah Tinggi Teknik Wiworotomo, Banyumas, Indonesia
  • Hidayatul Ichwan Department of Informatics Engineering, Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta (STMIK Jayakarta), Jakarta, Indonesia
  • Fajar Mahardika Department of Computer and Business, Informatics Engineering Program, Politeknik Negeri Cilacap, Cilacap, Indonesia
  • Rizki Ripai Department of Cyber Security Engineering, Politeknik Piksi Input Serang, Serang, Indonesia

DOI:

10.33395/sinkron.v10i2.16030

Keywords:

anomaly detection; SIAKAD; server logs; machine learning; Random Forest; Isolation Forest

Abstract

The increasing reliance on Academic Information Systems (SIAKAD) in higher education institutions has resulted in a significant growth of server log data, which contains valuable information for monitoring system performance and security; however, manually identifying anomalies in large-scale log data remains inefficient, time-consuming, and prone to human error. Therefore, this study aims to evaluate and compare the performance of Random Forest and Isolation Forest algorithms in detecting anomalies within SIAKAD server logs. This research adopts a machine learning-based approach using a dataset of 5,000 server log records collected from the SIAKAD system, which underwent preprocessing stages including data cleaning, feature extraction, and normalization. Random Forest was implemented as a supervised learning method, while Isolation Forest was applied as an unsupervised anomaly detection technique, with performance evaluated using accuracy, precision, recall, and F1-score metrics. The experimental results show that Random Forest achieved an accuracy of 96.3%, precision of 95.8%, recall of 96.0%, and F1-score of 95.9%, while Isolation Forest achieved an accuracy of 94.1%, precision of 92.7%, recall of 93.5%, and F1-score of 93.1%. These findings indicate that both algorithms are effective in detecting anomalies, with Isolation Forest demonstrating strength in handling unlabeled data and rare events, while Random Forest provides higher performance when labeled data is available; thus, this study highlights the potential of integrating machine learning techniques into log monitoring systems to enhance anomaly detection in academic information systems.

 

GS Cited Analysis

Downloads

Download data is not yet available.

References

Ahir, D., … N. Shaikh-on Emerging Smart Computing and, and undefined 2025. n.d. “Analyzing Machine Learning Frameworks for Anomaly Detection on Web Server Log Data.” Ieeexplore.Ieee.Org. https://ieeexplore.ieee.org/abstract/document/10988343/.

Aldhafari, A., M. Aldunaifat, … A. Al-Nakheai-…. on Internet of Things, and undefined 2025. 2025. “Simulasi Teknik Phishing Terhadap Situs Tiruan Facebook Dan SIAKAD UNIRAYA Menggunakan Zphisher Dan Ngrok.” Ejurnal.Lkpkaryaprima.Id 16(2). https://ejurnal.lkpkaryaprima.id/index.php/juktisi/article/view/390.

Anilkumar, A., A. Shibu, … MA Varghese-…-gestao inovacao E., and undefined 2021. n.d. “Detecting and Analysing Network Logs Using Machine Learning Techniques.” Revistageintec.Net. http://revistageintec.net/old/wp-content/uploads/2022/02/1937.pdf.

Apdillah, D., and K. Sari. 2025. “Kecerdasan Buatan Dalam Pendidikan: Meningkatkan Kualitas Pembelajaran Dengan Teknologi.” https://books.google.com/books?hl=id&lr=&id=37pzEQAAQBAJ&oi=fnd&pg=PA1&dq=A+Performance+Evaluation+of+Random+Forest+SIAKAD+Server+Logs+Using+Machine+Learning+Approaches&ots=lz0LbLJytg&sig=tboRdGwmhsbY392Ml3KYfA7ac3w.

Bobde, Harshali, Avantika Aglawe, Shruti Lakhamapure, Dhanashri Ukey, and Komal Dhakate. 2024. “Log Alert System Server Log Recognition and Alert System.” Eprints.Umsida.Ac.Id (6):69–78. http://eprints.umsida.ac.id/14553/.

Cherrat, E. mehdi, R. Alaoui, H. Bouzahir-PeerJ Computer Science, and undefined 2020. 2020. “Convolutional Neural Networks Approach for Multimodal Biometric Identification System Using the Fusion of Fingerprint, Finger-Vein and Face Images.” Peerj.Com. doi:10.7717/peerj-cs.248.

Fontaine, J., C. Kappler, A. Shahid, ED Poorter -, undefined Parallel, undefined Grid, Cloud and, and undefined 2019. 2020. “Log-Based Intrusion Detection for Cloud Web Applications Using Machine Learning.” Springer 96:197–210. doi:10.1007/978-3-030-33509-0_18.

Intan, Dhanar, Surya Saputra, I. Putu, Dody Suarnatha, Fajar Mahardika, Andik Wijanarko, and Sitaresmi Wahyu Handani. 2023. “IoT-Based Smart Air Conditioner as a Preventive in the Post-COVID-19 Era: A Review.” Journal.Umy.Ac.IdDIS Saputra, IPD Suarnatha, F Mahardika, A Wijanarko, SW HandaniJournal of Robotics and Control (JRC), 2023•journal.Umy.Ac.Id 4(1). doi:10.18196/jrc.v4i1.17090.

Kahfi, A., R. Buaton, … IG Prahmana-of Artificial Intelligence and, and undefined 2025. 2025. “Implementation of Isolation Forest-Based Machine Learning in Batch Anomaly Detection on Zeek Log Data (Case Study: Langkat Regency Communication And.” Mail.Ioinformatic.Org 5(1):2808–4519. https://mail.ioinformatic.org/index.php/JAIEA/article/view/1547.

Khaerunnisa, Zahra, Kukuh Muhammad, and Fajar Mahardika. 2025. “Indonesian Journal of Digital Business Optimization of Cloud-Based Digital Archiving System Using Golang and the ICONIX Process.” 5(April):87–96.

Khan, M., S. Naz, Y. Khan, M. Zafar, M. Khan, G. Pau-IEEE Access, and undefined 2023. n.d. “Integration Model of Academic Information Systems and Learning Management Systems with REST Web Services Using External Databases.” Hrcak.Srce.Hr. https://hrcak.srce.hr/313242.

Kolla, T. 2023. “A Machine Learning Approach to Identifying Malicious DNS Requests through Server Log Analysis.” https://esource.dbs.ie/items/1964eeff-8c36-4ea6-88af-aebc09560c33.

Kumar, Anish, Sameer Sen, and Sanjeev Sinha. 2025. “Machine Learning Based Prediction Models for the Compressive Strength of High-Volume Fly Ash Concrete Reinforced with Silica Fume.” Springer 26(4):1683–1701. doi:10.1007/S42107-025-01277-Z.

Lestari, I. 2021. “Strategi Pemasaran Dalam Meningkatkan Penjualan Motor Bekas Di Doyok Motor Kecamatan Kebonsari Kabupaten Madiun.” Frontiers in Neuroscience 14(1):1–13.

Mahardika, F., … L. Syafirullah-Jurnal Teknik Informatika, and undefined 2026. 2026. “IoT-Based Smart Detector with SVM and XGBoost for Real-Time Child Growth Monitoring and Stunting Risk Prediction.” Jutif.If.Unsoed.Ac.IdF Mahardika, L Syafirullah, A NugrohoJurnal Teknik Informatika (Jutif), 2026•jutif.If.Unsoed.Ac.Id 7(1):2723–3863. doi:10.52436/1.jutif.2026.7.2.5394.

Mahardika, Fajar, Abdul Razak Naufal, and Mohammad AL AMIN. 2023. “Desain UI Dan UX Dalam Sistem Informasi Akademik Menggunakan Metode Extreme Programming.” Progresif: Jurnal Ilmiah Komputer 19(1):105–16. doi:10.35889/PROGRESIF.V19I1.1023.

Maniraj, SP, CS Ranganathan, S. Sekar-International Journal of, and undefined 2024. 2024. “Securing Web Applications with Owasp Zap for Comprehensive Security Testing.” Xlescience.Org 10(2). http://www.xlescience.org/index.php/IJASIS/article/view/175.

Maniraj, SP, CS Ranganathan, S. Sekar-International Journal of, and undefined 2024. n.d. “Enhancing K-Means Clustering for Journal Articles Using TF-IDF and LDA Feature Extraction.” Itscience-Indexing.Com. https://itscience-indexing.com/jurnal/index.php/brilliance/article/view/5547.

Mkungudza, Jonathan, Halima S. Twabi, and Samuel O. M. Manda. 2024. “Development of a Diagnostic Predictive Model for Determining Child Stunting in Malawi: A Comparative Analysis of Variable Selection Approaches.” Springer 24(1). doi:10.1186/S12874-024-02283-6.

Natalia, EM, K. Thahira, RF Sari, … W. Widya-DIDAKTIKA: Jurnal, and undefined 2025. 2025. “Deteksi Serangan Siber Menggunakan Machine Learning: Studi Pada Sistem Informasi Akademik.” 103.241.192.17 31(2):380–92. doi:10.30587/didaktika.v31i2.9596.

Nugroho, Adlan, Joko Purwanto, Muhammad Abdul Muin, and Fajar Mahardika. 2025. “UI / UX Design of a Web-Based Student Organizations System Using the Design Thinking Method Approach.” 7(1):24–38.

Patil, S., R. Bansode-Mukt Shabd Journal, and undefined 2024. n.d. “Performance Evaluation of Web Server Security Systems Designed Using Machine Learning Approach.” Researchgate.Net. https://www.researchgate.net/profile/Sainath-Patil/publication/379871991_Performance_Evaluation_of_Web_Server_Security_Systems_Designed_using_Machine_Learning_Approach/links/661f6c8539e7641c0bd24f92/Performance-Evaluation-of-Web-Server-Security-Systems-Designed-using-Machine-Learning-Approach.pdf.

Purwanto, Riyadi, Fajar Mahardika, Muhammad Nur Faiz, R Purwanto, F Mahardika, and M. Nur Faiz. 2025. “A Comparative Analysis of KIP-K Acceptance Prediction Based on School Type Using XGBoost, Random Forest, and SVM-RBF: Evaluation Through Accuracy And.” Ejournal.Pnc.Ac.Id 7(2):370–78. doi:10.35970/jinita.v7i2.2948.

Ripai, Rizki, Riki Aldi Pari, Fazar Sidik, Sony Veri Shandy, and Fajar Mahardika. n.d. “Implementasi Layanan Cloudflare Sebagai Mitigasi Terhadap Ancaman Pemindaian Dan Eksploitasi Siber Menggunakan Nmap Dan Metasploit.” Jurnal.Ilmubersama.ComR Ripai, RA Pari, F Sidik, SV Shandy, F Mahardikasudo Jurnal Teknik Informatika, 2025•jurnal.Ilmubersama.Com. doi:10.56211/sudo.v4i1.902.

Saleem, S., M. Sheeraz, … M. Hanif-…. on Cyber Warfare and, and undefined 2020. n.d. “Web Server Attack Detection Using Machine Learning.” Ieeexplore.Ieee.Org. https://ieeexplore.ieee.org/abstract/document/9292393/.

Saragih, RIE. 2025. “Predicting Student Academic Performance Using Random Forest Regression: A Case Study on Lms Behavioral Data.” Ejournal.Gevivapublisher.Org. https://ejournal.gevivapublisher.org/index.php/ijisit/article/view/68.

Singh, Sneh Lata, Mohd Suhail, Prashant Kandpal, Prashant Upreti, Priyanshu Verma, and Saksham Chauhan. 2025. “Machine Learning Approaches for User Authentication Anomaly Detection.” Indian Journal of Computer Science and Technology 04(03):292–300. doi:10.59256/indjcst.20250403046.

Suresh Ballala, M. R., E. Siri Mohana, G. Neha, K. Jeevitha, D. Ushaswini, and G. Vinoda. 2026. “AI POWERED SERVER LOG MANAGEMENT SOFTWARE.” Zesterapublications.Com 9:83. https://zesterapublications.com/journals/index.php/ijaene/article/view/241.

Syafirullah, Lutfi, Fajar Mahardika, Riyadi Purwanto, Dwi Novia Prasetyanti, Teknologi Rekayasa, Perangkat Lunak, Politeknik Negeri Cilacap, Teknik Informatika, and Politeknik Negeri Cilacap. 2026. “Performance Evaluation and Optimization of an IoT-Based Fish Smoking Monitoring System for Ensuring Product Quality.” 10(1):691–700.

Wiencek, R., S. Ghosh, J. Ramos, … K. Kaur-, and Control in, and undefined 2025. 2021. “AI Autonomous Cyber Defence System: An Ensemble Learning Approach for IoT Security.” Ieeexplore.Ieee.Org. doi:10.36227/techrxiv.17169080.

Wijayaningrum, VN, and AP Kirana. 2022. “Prediction of Student Academic Performance in Practicum Courses Based on Activity Logs and Student Background.” Ieeexplore.Ieee.Org. https://ieeexplore.ieee.org/abstract/document/9967888/.

Windiarti, IS, M. Miftahurrizqi-Jurnal Sains Komputer dan, and undefined 2022. 2025. “Perencanaan Implementasi Komputasi Awan Pada Infrastruktur Teknologi Dan Sistem Informasi Di UMPR: Implementation Of Cloud Computing Planning In.” Journal.Umpr.Ac.Id 16(2). https://journal.umpr.ac.id/index.php/jsakti/article/view/3698.

Zalukhu, Boy Setyawan, Fredin Samohouni Zai, Elena Dementieva Lase, Rosania Waruwu, Markus Prayoga Telaumbanua, and Ofelius Laia. 2025. “Simulasi Teknik Phishing Terhadap Situs Tiruan Facebook Dan SIAKAD UNIRAYA Menggunakan Zphisher Dan Ngrok.” Ejurnal.Lkpkaryaprima.Id 4:236–46. doi:10.62712/juktisi.v4i1.390.

Downloads


Crossmark Updates

How to Cite

Ratih, R., Yuniarto, A. H. P. ., Ichwan, H. ., Mahardika, F., & Ripai, R. . (2026). Performance Evaluation of Random Forest and Isolation Forest Algorithms for Detecting Anomalies in SIAKAD Server Log Data. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 10(2), 1220-1230. https://doi.org/10.33395/sinkron.v10i2.16030