Optimalisasi Keamanan Siber dan AI dalam Akselerasi Transformasi Digital Sektor Industri Sumatera Selatan
DOI:
https://doi.org/10.33394/jpu.v7i2.20555Keywords:
Cybersecurity, Artificial Intelligence, C-GUARDIAN, Digital Transformation, PT PLNAbstract
This community service program aims to strengthen the digital defense system of PT PLN Palembang through the integration of cybersecurity technology and artificial intelligence (AI). As a strategic state-owned enterprise, PT PLN faces the risk of cyberattacks targeting SCADA and ERP systems, which may disrupt national energy resilience. The implementation method of this community service activity was carried out systematically through stages of infrastructure auditing, socialization, intensive training, and direct technology implementation using a participatory-collaborative approach. The instrument utilized in this activity was the SCADA system, which was analyzed through real-time network traffic monitoring using machine learning and deep learning algorithms. The results of this community service activity indicate the successful implementation of a SCADA-based security system capable of providing early detection of zero-day threats, as well as enhancing the capacity of PT PLN’s IT personnel in independently managing network security. The impact of this activity is the establishment of a more resilient and secure digital transformation foundation for industries in South Sumatra, while simultaneously reducing dependence on conventional passive security systems.
References
Abdelmoumin, G., Rawat, D. B., & Rahman, A. (2022). On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things. IEEE Internet of Things Journal, 9(6), 4280–4290. https://doi.org/10.1109/JIOT.2021.3103829
Agus Syamsul Arifin, M., Stiawan, D., Suprapto, B. Y., Susanto, Salim, T., Idris, M. Y., Shenify, M., & Budiarto, R. (2024). A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard. IEEE Access, 12, 170553–170569. https://doi.org/10.1109/ACCESS.2024.3473895
Agus Syamsul Arifin, M., Stiawan, D., Susanto, Prasetya, D., Idris, M. Y., & Budiarto, R. (2021). Malicious Activity Recognition on SCADA Network IEC 60870-5-104 Protocol. ICT-PEP 2021 - International Conference on Technology and Policy in Energy and Electric Power: Emerging Energy Sustainability, Smart Grid, and Microgrid Technologies for Future Power System, Proceedings, 46–51. https://doi.org/10.1109/ICT-PEP53949.2021.9601066
Akhtar, T., & Gupta, B. B. (2021). Analysing smart power grid against different cyber attacks on SCADA system. International Journal of Innovative …. https://doi.org/10.1504/IJICA.2021.116656
Altaha, M., & Hong, S. (2022). Anomaly Detection for SCADA System Security Based on Unsupervised Learning and Function Codes Analysis in the DNP3 Protocol. Electronics (Switzerland), 11(14). https://doi.org/10.3390/electronics11142184
Arifin, M. A. S., Susanto, Stiawan, D., Idris, M. Y., & Budiarto, R. (2021). The trends of supervisory control and data acquisition security challenges in heterogeneous networks. Indonesian Journal of Electrical Engineering and Computer Science, 22(2), 874–883. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883
Choi, W., Pandey, S., & Kim, J. (2024). Detecting Cybersecurity Threats for Industrial Control Systems Using Machine Learning. IEEE Access, 12, 153550–153563. https://doi.org/10.1109/access.2024.3478830
Fadzil, L. M., Manickam, S., & Al-Shareeda, M. A. (2023). A Review of An Emerging Cyber Kill Chain Threat Model. 2nd International Conference on Advanced Computer Applications, ACA 2023, 157–161. https://doi.org/10.1109/ACA57612.2023.10346959
Girija, R., Abiram, G., Durgadevi, P., & Savita. (2024). Case Study: Artificial Intelligence and Machine Learning in Cybersecurity. Artificial Intelligence for Cyber Defense and Smart Policing, 172–176. https://doi.org/10.1201/9781003251781-12
Joshi, I. P., & Shandilya, V. K. (2025). Anomaly Detection and Threat Intelligence With Machine Learning. Exploiting Machine Learning for Robust Security, 69–98. https://doi.org/10.4018/979-8-3693-7758-1.ch004
Li, D., Tang, J., Wu, S., Zheng, Z., & Ng, S.-K. (2025). Cyber-Attack Detection and Localization for SCADA system of CPSs. 2025 IEEE/ACM Second International Conference on AI Foundation Models and Software Engineering (Forge), 269–279. https://doi.org/10.1109/forge66646.2025.00038
Nazir, S., Patel, S., & Patel, D. (2021). Autoencoder Based Anomaly Detection for SCADA Networks. International Journal of Artificial Intelligence and Machine Learning, 11(2), 83–99. https://doi.org/10.4018/ijaiml.20210701.oa6
Panagiotou, P., Mengidis, N., Tsikrika, T., Vrochidis, S., & Kompatsiaris, I. (2021). Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods. Information & Security: An International Journal, 50, 37–48. https://doi.org/10.11610/isij.5016
Rafique, S. H., Abdallah, A., Musa, N. S., & Murugan, T. (2024). Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends. Sensors, 24(6). https://doi.org/10.3390/s24061968
Rahman, M. S., Hossain, M. S., Rahman, M. K., Islam, M. R., Sumon, M. F. I., Siam, M. A., & Debnath, P. (2025). Enhancing Supply Chain Transparency with Blockchain: A Data-Driven Analysis of Distributed Ledger Applications. Journal of Business and Management Studies, 7(3), 59–77. https://doi.org/10.32996/jbms.2025.7.3.7
Saeed, M. M., Saeed, R. A., Abdelhaq, M., Alsaqour, R., Hasan, M. K., & Mokhtar, R. A. (2023). Anomaly Detection in 6G Networks Using Machine Learning Methods. Electronics (Switzerland), 12(15). https://doi.org/10.3390/electronics12153300
Shukla, A. K., Srivastav, S., Kumar, S., & Muhuri, P. K. (2023). UInDeSI4.0: An efficient Unsupervised Intrusion Detection System for network traffic flow in Industry 4.0 ecosystem. Engineering Applications of Artificial Intelligence, 120, 105848.
Sommestad, T., Holm, H., & Steinvall, D. (2022). Variables influencing the effectiveness of signature-based network intrusion detection systems. Information Security Journal, 31(6), 711–728. https://doi.org/10.1080/19393555.2021.1975853
Taqi, H. M. M., Nayeem, I., Bari, A. B. M. M., Anam, M. Z., & Ali, S. M. (2025). Addressing challenges to cloud manufacturing in industry 4.0 environment using an integrated approach: Implications for sustainability. Green Technologies and Sustainability, 3(3). https://doi.org/10.1016/j.grets.2024.100166
Tharewal, S., Ashfaque, M. W., Banu, S. S., Uma, P., Hassen, S. M., & Shabaz, M. (2022). Intrusion Detection System for Industrial Internet of Things Based on Deep Reinforcement Learning. Wireless Communications and Mobile Computing, 2022. https://doi.org/10.1155/2022/9023719
Downloads
Published
How to Cite
Issue
Section
Citation Check
License
Copyright (c) 2026 The Author(s)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).



