AI-Powered Intrusion Detection System Design for Government Data Center Infrastructure Security

Desain Sistem Deteksi Intrusi Berbasis Kecerdasan Buatan untuk Keamanan Infrastruktur Pusat Data Pemerintah

Authors

  • Adi Affandi Rotib Universitas Sains Indonesia
  • Silviana Windasari Universitas Sains Indonesia
  • Abdurohman Abdurohman Atma Jaya Catholic University of Indonesia

DOI:

https://doi.org/10.55606/jupikom.v5i1.6745

Keywords:

Artificial Intelligence, Intrusion Detection System, Data Center Security, Government Infrastructure, Cyber Resilience

Abstract

Government data centers serve as critical infrastructure for national digital sovereignty, yet
they remain highly vulnerable to sophisticated cyber threats. Recent incidents, notably the 2024 LockBit
3.0 ransomware attack on Indonesia’s Temporary National Data Center (PDNS 2), have exposed the
fundamental limitations of traditional signature-based security systems. This research proposes the design
of an Artificial Intelligence (AI)-powered Intrusion Detection System (IDS) specifically tailored for
government data center environments. Utilizing the Knowledge Discovery in Databases (KDD)
framework, the system was evaluated against the CICIDS2017 and NSL-KDD benchmark datasets. To
address the challenge of imbalanced network traffic, the study implemented the Synthetic Minority
Oversampling Technique (SMOTE) combined with Edited Nearest Neighbors (ENN). Experimental
results demonstrate that the Random Forest (RF) and XGBoost algorithms achieve superior
performance, reaching an overall accuracy of 99.66%. While RF excels in recall for detecting Distributed
Denial of Service (DDoS) and Brute Force attacks, Support Vector Machine (SVM) provides higher
precision in minimizing false positives. Additionally, deep learning models such as LSTM show
effectiveness in identifying complex temporal patterns like botnets. The integration of this AI-IDS into
the National Data Center (PDN) architecture not only aligns with the Personal Data Protection Law (UU
PDP) of 2022 but also fulfills the audit standards mandated by BSSN Regulation No. 8 of 2024. This
study concludes that an autonomous, AI-driven defense mechanism is essential to ensuring proactive
security and service continuity within the Indonesian government’s digital ecosystem

References

[1] T. Karkar and A. H. Al-Helali, “AI-Powered Intrusion Detection Systems: Enhancing Real-Time Network Threat

Monitoring-A Systematic Review,” May 2025. Accessed: Jan. 14, 2026. [Online]. Available: https://www.ijaiml.com/wp

content/uploads/2025/05/Volume7Issue5Paper1.pdf

[2] A. Marcal, S. Tommy, M. Irwan Padli Nasution, P. Manajemen, and F. Ekonomi dan Bisnis Islam, “Evaluasi Manajemen

Risiko Keamanan Siber pada Infrastruktur Digital Pemerintah: Studi Kasus Pusat Data Nasional (PDN),” Jurnal Ilmiah

Ekonomi Dan Manajemen, vol. 3, no. 6, pp. 330–346, 2025, doi: 10.61722/jiem.v3i6.5266.

[3] htblaw, “Indonesia personal data and cybersecurity quarterly update — October 2025 edition,” Hbtlaw. Accessed: Jan. 14,

2026. [Online]. Available: https://www.hbtlaw.com/insights/2025-11/indonesia-personal-data-and-cybersecurity-quarterly

update-october-2025

[4] BSSN,

“peraturan-bssn-no-8-tahun-2024”,

Accessed:

Jan.

https://peraturan.bpk.go.id/Details/309821/peraturan-bssn-no-8-tahun-2024

14,

2026.

[Online].

Available:

[5] D. P. Amanda, E. Dheanda Absharina, S. Informasi, U. Raden, and F. Palembang, “IMPLEMENTASI AI-POWERED

INTRUSION DETECTION SYSTEMS UNTUK MENDETEKSI ANCAMAN KEAMANAN PADA BIG DATA,” vol.

10, no. 1, 2025.

[6] M. Azhar, “Indonesia shifting to more collaborative data centre strategy,” GovInsider. Accessed: Jan. 14, 2026. [Online].

Available: https://govinsider.asia/intl-en/article/indonesia-shifting-to-more-collaborative-data-centre-strategy

[7] Cloudmatika, “Peraturan Data Center di Indonesia: Regulasi, Standar Keamanan, dan Praktik Terbaik untuk Perusahaan,”

Cloudmatika. Accessed: Jan. 14, 2026. [Online]. Available: https://cloudmatika.co.id/blog-detail/peraturan-data-center-di

indonesia

[8] Diskominfo Natuna, “PENYUSUNAN DOKUMEN ARSITEKTUR DAN PETA RENCANA SPBE BUKU 4

ARSITEKTUR INFRASTRUKTUR SPBE.”

[9] DTrust Team, “Meningkatkan Keamanan Siber Nasional: Peran dan Tantangan di Tahun 2025,” Dtrust. Accessed: Jan. 14,

2026. [Online]. Available: https://resources.dtrust.co.id/blog/meningkatkan-keamanan-siber-nasional-peran-dan-tantangan

di-tahun-2025/

[10] A. Suryadi and I. Marzuki, “Pengembangan Intrusion Detection System (Ids) Berbasis Machine Learning,” Jurnal

Telekomunikasi dan Komputer, vol. 13, no. 3, pp. 189–195, doi: 10.22441/incomtech.v13i3.15118.

[11] N. Khan, M. I. Mohmand, S. U. Rehman, Z. Ullah, Z. Khan, and W. Boulila, “Advancements in intrusion detection: A

lightweight hybrid RNN-RF model,” Jun. 01, 2024, Public Library of Science. doi: 10.1371/journal.pone.0299666.

[12] N. Rahmeisi, E. Gani, and A. Arfriandi, “Tinjauan Literatur : Pendekatan Machine Learning Dalam Deteksi Serangan Web,”

Jurnal Ilmiah Sistem Informasi, vol. 4, no. 3, pp. 772–791, Nov. 2025, doi: 10.51903/3w0vwc80.

2026.

[Online].

[13] S. Patil, “Comparative Analysis of AI-Driven Intrusion Detection Systems Using Machine Learning,” Scribd. Accessed: Jan.

14,

Available:

https://www.scribd.com/document/913070372/Comparative-Analysis-of-Ai-driven

Intrusion-Detection-Systems-Using-Machine-Learning

[14] D. Govindrao Hakke, A. Y. Dixit, S. Thorat, G. S. Malande, and A. K. Panpatte, “(on-line version) PERFORMANCE

EVALUATION OF MACHINE LEARNING-BASED INTRUSION DETECTION USING NSL-KDD, UNSW-NB15

AND CICIDS2017 DATASETS,” Int. J. Appl. Math. (Sofia)., vol. 38, no. 3, p. 2025, [Online]. Available:

https://orcid.org/0009-0004-7503-8449Id:https://orcid.org/:https://orcid.org/0009-0001-6494-:https://orcid.org/0009

0004-3756-9310

[15] Kominfo, “Presentasi Jaringan Intra Pemerintah,” Scibd. Accessed: Jan. 15, 2026. [Online]. Available:

https://www.scribd.com/document/654891108/Presentasi-Jaringan-Intra-Pemerintah

[16] M. I. Iskandar, “Intrusion Detection System: Lapisan Pertama Keamanan Jaringan,” Aplikas. Accessed: Jan. 15, 2026.

[Online]. Available: https://aplikas.com/blog/intrusion-detection-system/

[17] P. Waghmode, M. Kanumuri, H. El-Ocla, and T. Boyle, “Intrusion detection system based on machine learning using least

square support vector machine,” Sci. Rep., vol. 15, no. 1, Dec. 2025, doi: 10.1038/s41598-025-95621-7.

[18] R. Alkautsar, “Sistem Deteksi Intrusi: Lindungi Jaringan dari Ancaman,” Hypernet. Accessed: Jan. 15, 2026. [Online].

Available: https://www.hypernet.co.id/id/sistem-deteksi-intrusi-lindungi-jaringan/

[19] HP Online Store, “Securing AI Systems: A Comprehensive Data Protection Guide for

Published

2026-02-28

How to Cite

Adi Affandi Rotib, Silviana Windasari, & Abdurohman Abdurohman. (2026). AI-Powered Intrusion Detection System Design for Government Data Center Infrastructure Security: Desain Sistem Deteksi Intrusi Berbasis Kecerdasan Buatan untuk Keamanan Infrastruktur Pusat Data Pemerintah. Jurnal Publikasi Ilmu Komputer Dan Multimedia, 5(1), 309–319. https://doi.org/10.55606/jupikom.v5i1.6745