An Experimental Evaluation of Machine Learning Models for Judicial Decision Prediction Using Indonesian Court Decisions
Keywords:
Machine Learning, Judicial Decision, Indonesian Court, Legal, Artificial IntelligenceAbstract
Judicial outcome analysis has attracted growing attention within legal artificial intelligence research; however, empirical studies focusing on Indonesian court decisions remain limited. This study presents an experimental evaluation of traditional machine learning and deep learning models for judicial outcome classification using Indonesian legal texts.The experiments were conducted on a curated dataset of 4,872 court decisions obtained from the official Direktori Putusan Mahkamah Agung Republik Indonesia (2018–2023). To prevent outcome leakage, all explicit ruling sections were removed prior to model training, and only the legal reasoning segments were used as input. Several models, including Logistic Regression, Support Vector Machine, Gradient Boosting, BiLSTM, and IndoBERT, were evaluated under identical experimental settings. The results show that ensemble-based methods, particularly Gradient Boosting, achieve strong and stable performance, while deep learning models demonstrate competitive but not consistently superior results under document length constraints. Error analysis indicates that misclassifications frequently arise from implicit judicial reasoning and outcome ambiguity. This study provides an empirical benchmark for judicial outcome classification in Indonesian courts and highlights methodological limitations related to document length, labeling granularity, and reproducibility in legal NLP research.
References
[1] R. Wijaya, N. Karna, and I. D. Irawati, “Optimizing machine learning-based network intrusion detection system with oversampling, feature selection, and extraction,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, vol. 11, no. 2, 2025.
[2] B. Purnama, E. A. Winanto, S. Sharipuddin, D. Sandra, N. Nurhadi, and L. Afuan, “RNN-based intrusion detection system for Internet of Vehicles with IG, PCA, and RF feature selection,” Jurnal Teknik Informatika, vol. 6, no. 5, 2025.
[3] M. Nasution and M. H. Munandar, “Network security system using firewall and intrusion detection system on small-to-medium scale infrastructure,” Jurnal Media Informatika, vol. 6, no. 6, 2025.
[4] M. A. Al Hilmi and E. Khujaemah, “Network security monitoring with intrusion detection system,” Jurnal Teknik Informatika (JUTIF), vol. 3, no. 2, 2022.
[5] R. Manivannan and S. Senthilkumar, “Intrusion detection system for network security using novel adaptive recurrent neural network-based fox optimizer concept,” International Journal of Computational Intelligence Systems, vol. 18, art. no. 37, 2025.
[6] M. Almania, A. Zainal, F. A. Ghaleb, A. Alnawasrah, and M. Al Qerom, “Adaptive intrusion detection system with ensemble classifiers for handling imbalanced datasets and dynamic network traffic,” Journal of Research in Computer Science, vol. 6, no. 1, 2025.
[7] R. Chinnasamy, M. Subramanian, S. V. Easwaramoorthy, and J. Cho, “Deep learning-driven methods for network-based intrusion detection systems: A systematic review,” ICT Express, vol. 11, no. 1, pp. 181–215, 2025.
[8] R. Kimanzi, P. Kimanga, D. Cherori, and P. K. Gikunda, “Deep learning algorithms used in intrusion detection systems: A review,” 2024.
[9] S. Jamshidi, A. Nikanjam, N. K. Wazed, and F. Khomh, “Leveraging machine learning techniques in intrusion detection systems for Internet of Things,” 2025.
[10] N. Sarhan, S. Layeghy, N. Moustafa, M. Gallagher, and M. Portmann, “Feature extraction for machine learning-based intrusion detection in IoT networks,” Digital Communications and Networks, vol. 10, no. 1, 2024.
[11] T. Saranya and S. I. Priyadharshini, “A dual-strategy framework for cyber threat detection in imbalanced, high-dimensional data,” IEEE Access, 2025.
[12] S. A. Albelwi, “An intrusion detection system for identifying simultaneous attacks using multi-task learning and deep learning,” in Proc. 2022 2nd International Conference on Computing and Information Technology, IEEE, 2022.
[13] “Network traffic intrusion detection by convolutional variational self-encoder incorporating improved convolutional attention,” in Proc. ACM, 2025.
[14] M. Zhong, M. Lin, C. Zhang, and Z. Xu, “A survey on graph neural networks for intrusion detection systems: Methods, trends, and challenges,” Expert Systems with Applications, 2024.
[15] S. Sharma, R. Jain, and A. Srivastava, “Transfer learning for anomaly detection in IoT systems,” Journal of Computer Network and Communication Security, 2020.
[16] A. Parashar, K. S. Saggu, and A. Garg, “Machine learning-based framework for network intrusion detection system using stacking ensemble technique,” Indian Journal of Engineering and Materials Sciences, 2022.
[17] P. Musaab R. and D. A., “Intrusion detection system using feature extraction with machine learning algorithms in IoT,” Journal of Sensor and Actuator Networks, vol. 12, 2023.
[18] D. Umer, K. N. Junejo, M. T. Jilani, and A. P. Mathur, “Machine learning for intrusion detection in industrial control systems,” International Journal of Critical Infrastructure Protection, vol. 38, 2022.
[19] N. Liu, Z. Thapa, B. Gokaraju, “Comparison of machine learning and deep learning models for network intrusion detection systems,” Future Internet, vol. 12, 2020.
[20] X. Zhao, K. W. Fok, and V. L. Thing, “Enhancing network intrusion detection performance using generative adversarial networks,” Computers & Security, vol. 145, 2024.
[21] “Improving detection accuracy of network intrusions using a hybrid model of signature- and anomaly-based IDS,” Jurnal Teknik Informatika, 2025.
[22] N. Baci, K. Vukatana, and M. Baci, “Machine learning approach for intrusion detection systems as a cyber security strategy for SMEs,” WSEAS Transactions on Business and Economics, vol. 19, 2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Journal of Artificial Intelligence and Legal Technology

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








