AI-Powered Intrusion Detection System Design for Government Data Center Infrastructure Security
Desain Sistem Deteksi Intrusi Berbasis Kecerdasan Buatan untuk Keamanan Infrastruktur Pusat Data Pemerintah
DOI:
https://doi.org/10.55606/jupikom.v5i1.6745Keywords:
Artificial Intelligence, Intrusion Detection System, Data Center Security, Government Infrastructure, Cyber ResilienceAbstract
Government data centers serve as critical infrastructure for national digital sovereignty, yet
they remain highly vulnerable to sophisticated cyber threats. Recent incidents, notably the 2024 LockBit
3.0 ransomware attack on Indonesia’s Temporary National Data Center (PDNS 2), have exposed the
fundamental limitations of traditional signature-based security systems. This research proposes the design
of an Artificial Intelligence (AI)-powered Intrusion Detection System (IDS) specifically tailored for
government data center environments. Utilizing the Knowledge Discovery in Databases (KDD)
framework, the system was evaluated against the CICIDS2017 and NSL-KDD benchmark datasets. To
address the challenge of imbalanced network traffic, the study implemented the Synthetic Minority
Oversampling Technique (SMOTE) combined with Edited Nearest Neighbors (ENN). Experimental
results demonstrate that the Random Forest (RF) and XGBoost algorithms achieve superior
performance, reaching an overall accuracy of 99.66%. While RF excels in recall for detecting Distributed
Denial of Service (DDoS) and Brute Force attacks, Support Vector Machine (SVM) provides higher
precision in minimizing false positives. Additionally, deep learning models such as LSTM show
effectiveness in identifying complex temporal patterns like botnets. The integration of this AI-IDS into
the National Data Center (PDN) architecture not only aligns with the Personal Data Protection Law (UU
PDP) of 2022 but also fulfills the audit standards mandated by BSSN Regulation No. 8 of 2024. This
study concludes that an autonomous, AI-driven defense mechanism is essential to ensuring proactive
security and service continuity within the Indonesian government’s digital ecosystem
References
[1] T. Karkar and A. H. Al-Helali, “AI-Powered Intrusion Detection Systems: Enhancing Real-Time Network Threat
Monitoring-A Systematic Review,” May 2025. Accessed: Jan. 14, 2026. [Online]. Available: https://www.ijaiml.com/wp
content/uploads/2025/05/Volume7Issue5Paper1.pdf
[2] A. Marcal, S. Tommy, M. Irwan Padli Nasution, P. Manajemen, and F. Ekonomi dan Bisnis Islam, “Evaluasi Manajemen
Risiko Keamanan Siber pada Infrastruktur Digital Pemerintah: Studi Kasus Pusat Data Nasional (PDN),” Jurnal Ilmiah
Ekonomi Dan Manajemen, vol. 3, no. 6, pp. 330–346, 2025, doi: 10.61722/jiem.v3i6.5266.
[3] htblaw, “Indonesia personal data and cybersecurity quarterly update — October 2025 edition,” Hbtlaw. Accessed: Jan. 14,
2026. [Online]. Available: https://www.hbtlaw.com/insights/2025-11/indonesia-personal-data-and-cybersecurity-quarterly
update-october-2025
[4] BSSN,
“peraturan-bssn-no-8-tahun-2024”,
Accessed:
Jan.
https://peraturan.bpk.go.id/Details/309821/peraturan-bssn-no-8-tahun-2024
14,
2026.
[Online].
Available:
[5] D. P. Amanda, E. Dheanda Absharina, S. Informasi, U. Raden, and F. Palembang, “IMPLEMENTASI AI-POWERED
INTRUSION DETECTION SYSTEMS UNTUK MENDETEKSI ANCAMAN KEAMANAN PADA BIG DATA,” vol.
10, no. 1, 2025.
[6] M. Azhar, “Indonesia shifting to more collaborative data centre strategy,” GovInsider. Accessed: Jan. 14, 2026. [Online].
[7] Cloudmatika, “Peraturan Data Center di Indonesia: Regulasi, Standar Keamanan, dan Praktik Terbaik untuk Perusahaan,”
Cloudmatika. Accessed: Jan. 14, 2026. [Online]. Available: https://cloudmatika.co.id/blog-detail/peraturan-data-center-di
indonesia
[8] Diskominfo Natuna, “PENYUSUNAN DOKUMEN ARSITEKTUR DAN PETA RENCANA SPBE BUKU 4
ARSITEKTUR INFRASTRUKTUR SPBE.”
[9] DTrust Team, “Meningkatkan Keamanan Siber Nasional: Peran dan Tantangan di Tahun 2025,” Dtrust. Accessed: Jan. 14,
2026. [Online]. Available: https://resources.dtrust.co.id/blog/meningkatkan-keamanan-siber-nasional-peran-dan-tantangan
di-tahun-2025/
[10] A. Suryadi and I. Marzuki, “Pengembangan Intrusion Detection System (Ids) Berbasis Machine Learning,” Jurnal
Telekomunikasi dan Komputer, vol. 13, no. 3, pp. 189–195, doi: 10.22441/incomtech.v13i3.15118.
[11] N. Khan, M. I. Mohmand, S. U. Rehman, Z. Ullah, Z. Khan, and W. Boulila, “Advancements in intrusion detection: A
lightweight hybrid RNN-RF model,” Jun. 01, 2024, Public Library of Science. doi: 10.1371/journal.pone.0299666.
[12] N. Rahmeisi, E. Gani, and A. Arfriandi, “Tinjauan Literatur : Pendekatan Machine Learning Dalam Deteksi Serangan Web,”
Jurnal Ilmiah Sistem Informasi, vol. 4, no. 3, pp. 772–791, Nov. 2025, doi: 10.51903/3w0vwc80.
2026.
[Online].
[13] S. Patil, “Comparative Analysis of AI-Driven Intrusion Detection Systems Using Machine Learning,” Scribd. Accessed: Jan.
14,
Available:
https://www.scribd.com/document/913070372/Comparative-Analysis-of-Ai-driven
Intrusion-Detection-Systems-Using-Machine-Learning
[14] D. Govindrao Hakke, A. Y. Dixit, S. Thorat, G. S. Malande, and A. K. Panpatte, “(on-line version) PERFORMANCE
EVALUATION OF MACHINE LEARNING-BASED INTRUSION DETECTION USING NSL-KDD, UNSW-NB15
AND CICIDS2017 DATASETS,” Int. J. Appl. Math. (Sofia)., vol. 38, no. 3, p. 2025, [Online]. Available:
0004-3756-9310
[15] Kominfo, “Presentasi Jaringan Intra Pemerintah,” Scibd. Accessed: Jan. 15, 2026. [Online]. Available:
https://www.scribd.com/document/654891108/Presentasi-Jaringan-Intra-Pemerintah
[16] M. I. Iskandar, “Intrusion Detection System: Lapisan Pertama Keamanan Jaringan,” Aplikas. Accessed: Jan. 15, 2026.
[Online]. Available: https://aplikas.com/blog/intrusion-detection-system/
[17] P. Waghmode, M. Kanumuri, H. El-Ocla, and T. Boyle, “Intrusion detection system based on machine learning using least
square support vector machine,” Sci. Rep., vol. 15, no. 1, Dec. 2025, doi: 10.1038/s41598-025-95621-7.
[18] R. Alkautsar, “Sistem Deteksi Intrusi: Lindungi Jaringan dari Ancaman,” Hypernet. Accessed: Jan. 15, 2026. [Online].
Available: https://www.hypernet.co.id/id/sistem-deteksi-intrusi-lindungi-jaringan/
[19] HP Online Store, “Securing AI Systems: A Comprehensive Data Protection Guide for
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Jurnal Publikasi Ilmu Komputer dan Multimedia

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.






