Optimalisasi Keamanan Siber dan AI dalam Akselerasi Transformasi Digital Sektor Industri Sumatera Selatan

Authors

  • Deris Stiawan Universitas Sriwijaya, Indonesia
  • Ahmad Heryanto Universitas Sriwijaya, Indonesia
  • Nurul Afifah Universitas Sriwijaya, Indonesia
  • Adi Hermansyah Universitas Sriwijaya, Indonesia
  • Dian Palupi Rini Universitas Sriwijaya, Indonesia
  • Septiani Kusuma Ningrum Universitas Sriwijaya, Indonesia
  • Dendi Renaldo Permana Universitas Sriwijaya, Indonesia

DOI:

https://doi.org/10.33394/jpu.v7i2.20555

Keywords:

Cybersecurity, Artificial Intelligence, C-GUARDIAN, Digital Transformation, PT PLN

Abstract

This community service program aims to strengthen the digital defense system of PT PLN Palembang through the integration of cybersecurity technology and artificial intelligence (AI). As a strategic state-owned enterprise, PT PLN faces the risk of cyberattacks targeting SCADA and ERP systems, which may disrupt national energy resilience. The implementation method of this community service activity was carried out systematically through stages of infrastructure auditing, socialization, intensive training, and direct technology implementation using a participatory-collaborative approach. The instrument utilized in this activity was the SCADA system, which was analyzed through real-time network traffic monitoring using machine learning and deep learning algorithms. The results of this community service activity indicate the successful implementation of a SCADA-based security system capable of providing early detection of zero-day threats, as well as enhancing the capacity of PT PLN’s IT personnel in independently managing network security. The impact of this activity is the establishment of a more resilient and secure digital transformation foundation for industries in South Sumatra, while simultaneously reducing dependence on conventional passive security systems.

References

Abdelmoumin, G., Rawat, D. B., & Rahman, A. (2022). On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things. IEEE Internet of Things Journal, 9(6), 4280–4290. https://doi.org/10.1109/JIOT.2021.3103829

Agus Syamsul Arifin, M., Stiawan, D., Suprapto, B. Y., Susanto, Salim, T., Idris, M. Y., Shenify, M., & Budiarto, R. (2024). A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard. IEEE Access, 12, 170553–170569. https://doi.org/10.1109/ACCESS.2024.3473895

Agus Syamsul Arifin, M., Stiawan, D., Susanto, Prasetya, D., Idris, M. Y., & Budiarto, R. (2021). Malicious Activity Recognition on SCADA Network IEC 60870-5-104 Protocol. ICT-PEP 2021 - International Conference on Technology and Policy in Energy and Electric Power: Emerging Energy Sustainability, Smart Grid, and Microgrid Technologies for Future Power System, Proceedings, 46–51. https://doi.org/10.1109/ICT-PEP53949.2021.9601066

Akhtar, T., & Gupta, B. B. (2021). Analysing smart power grid against different cyber attacks on SCADA system. International Journal of Innovative …. https://doi.org/10.1504/IJICA.2021.116656

Altaha, M., & Hong, S. (2022). Anomaly Detection for SCADA System Security Based on Unsupervised Learning and Function Codes Analysis in the DNP3 Protocol. Electronics (Switzerland), 11(14). https://doi.org/10.3390/electronics11142184

Arifin, M. A. S., Susanto, Stiawan, D., Idris, M. Y., & Budiarto, R. (2021). The trends of supervisory control and data acquisition security challenges in heterogeneous networks. Indonesian Journal of Electrical Engineering and Computer Science, 22(2), 874–883. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883

Choi, W., Pandey, S., & Kim, J. (2024). Detecting Cybersecurity Threats for Industrial Control Systems Using Machine Learning. IEEE Access, 12, 153550–153563. https://doi.org/10.1109/access.2024.3478830

Fadzil, L. M., Manickam, S., & Al-Shareeda, M. A. (2023). A Review of An Emerging Cyber Kill Chain Threat Model. 2nd International Conference on Advanced Computer Applications, ACA 2023, 157–161. https://doi.org/10.1109/ACA57612.2023.10346959

Girija, R., Abiram, G., Durgadevi, P., & Savita. (2024). Case Study: Artificial Intelligence and Machine Learning in Cybersecurity. Artificial Intelligence for Cyber Defense and Smart Policing, 172–176. https://doi.org/10.1201/9781003251781-12

Joshi, I. P., & Shandilya, V. K. (2025). Anomaly Detection and Threat Intelligence With Machine Learning. Exploiting Machine Learning for Robust Security, 69–98. https://doi.org/10.4018/979-8-3693-7758-1.ch004

Li, D., Tang, J., Wu, S., Zheng, Z., & Ng, S.-K. (2025). Cyber-Attack Detection and Localization for SCADA system of CPSs. 2025 IEEE/ACM Second International Conference on AI Foundation Models and Software Engineering (Forge), 269–279. https://doi.org/10.1109/forge66646.2025.00038

Nazir, S., Patel, S., & Patel, D. (2021). Autoencoder Based Anomaly Detection for SCADA Networks. International Journal of Artificial Intelligence and Machine Learning, 11(2), 83–99. https://doi.org/10.4018/ijaiml.20210701.oa6

Panagiotou, P., Mengidis, N., Tsikrika, T., Vrochidis, S., & Kompatsiaris, I. (2021). Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods. Information & Security: An International Journal, 50, 37–48. https://doi.org/10.11610/isij.5016

Rafique, S. H., Abdallah, A., Musa, N. S., & Murugan, T. (2024). Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends. Sensors, 24(6). https://doi.org/10.3390/s24061968

Rahman, M. S., Hossain, M. S., Rahman, M. K., Islam, M. R., Sumon, M. F. I., Siam, M. A., & Debnath, P. (2025). Enhancing Supply Chain Transparency with Blockchain: A Data-Driven Analysis of Distributed Ledger Applications. Journal of Business and Management Studies, 7(3), 59–77. https://doi.org/10.32996/jbms.2025.7.3.7

Saeed, M. M., Saeed, R. A., Abdelhaq, M., Alsaqour, R., Hasan, M. K., & Mokhtar, R. A. (2023). Anomaly Detection in 6G Networks Using Machine Learning Methods. Electronics (Switzerland), 12(15). https://doi.org/10.3390/electronics12153300

Shukla, A. K., Srivastav, S., Kumar, S., & Muhuri, P. K. (2023). UInDeSI4.0: An efficient Unsupervised Intrusion Detection System for network traffic flow in Industry 4.0 ecosystem. Engineering Applications of Artificial Intelligence, 120, 105848.

Sommestad, T., Holm, H., & Steinvall, D. (2022). Variables influencing the effectiveness of signature-based network intrusion detection systems. Information Security Journal, 31(6), 711–728. https://doi.org/10.1080/19393555.2021.1975853

Taqi, H. M. M., Nayeem, I., Bari, A. B. M. M., Anam, M. Z., & Ali, S. M. (2025). Addressing challenges to cloud manufacturing in industry 4.0 environment using an integrated approach: Implications for sustainability. Green Technologies and Sustainability, 3(3). https://doi.org/10.1016/j.grets.2024.100166

Tharewal, S., Ashfaque, M. W., Banu, S. S., Uma, P., Hassen, S. M., & Shabaz, M. (2022). Intrusion Detection System for Industrial Internet of Things Based on Deep Reinforcement Learning. Wireless Communications and Mobile Computing, 2022. https://doi.org/10.1155/2022/9023719

Downloads

Published

2026-05-08

How to Cite

Deris Stiawan, Ahmad Heryanto, Nurul Afifah, Adi Hermansyah, Dian Palupi Rini, Septiani Kusuma Ningrum, & Dendi Renaldo Permana. (2026). Optimalisasi Keamanan Siber dan AI dalam Akselerasi Transformasi Digital Sektor Industri Sumatera Selatan . Jurnal Pengabdian UNDIKMA, 7(2), 796–804. https://doi.org/10.33394/jpu.v7i2.20555

Citation Check