Main Article Content
Abstract
This research examines cybersecurity approaches in Indonesia, focusing on the implementation of Artificial Intelligence (AI) technology compared to non-AI systems in detecting and preventing threats. The study identifies the advantages of AI, such as its capabilities in large-scale data analysis, detection of suspicious patterns, and reduction of human error. The methodology follows PRISMA guidelines for systematic literature review. Findings reveal that while AI can enhance threat detection effectiveness and resilience against attacks, the adoption of this technology in Indonesia remains limited by infrastructure, resources, and technical expertise. This research is expected to provide insights for more proactive national cybersecurity policies and support the development of AI technology in future information security initiatives.
Keywords
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
-
[1] M. Sobron and Lubis, “Implementasi Artificial Intelligence Pada System Manufaktur Terpadu,” Semin. Nas. Tek. UISU, vol. 4, no. 1, pp. 1–7, 2021.
[2] A. Liberati et al., “The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate healthcare interventions: explanation and elaboration.,” BMJ, vol. 339, 2009, doi: 10.1136/bmj.b2700.
[3] M. F. Ansari, B. Dash, P. Sharma, and N. Yathiraju, “The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review,” Ijarcce, vol. 11, no. 9, pp. 81–90, 2022, doi: 10.17148/ijarcce.2022.11912.
[4] N. H. Sinaga, D. Irmayani, and M. N. S. Hasibuan, “Mengoptimalkan Keamanan Jaringan: Memanfaatkan Kecerdasan Buatan Untuk Meningkatkan Deteksi Dan Respon Ancaman,” J. Ilmu Komput. dan Sist. Inf. (JIKOMSI, vol. 7 Nomor 2, no. September, pp. 364–369, 2024.
[5] N. Capuano, G. Fenza, V. Loia, and C. Stanzione, “Explainable Artificial Intelligence in CyberSecurity: A Survey,” IEEE Access, vol. 10, no. August, pp. 93575–93600, 2022, doi: 10.1109/ACCESS.2022.3204171.
[6] R. Kaur, D. Gabrijelčič, and T. Klobučar, “Artificial intelligence for cybersecurity: Literature review and future research directions,” Inf. Fusion, vol. 97, no. March, 2023, doi: 10.1016/j.inffus.2023.101804.
[7] C. Beaman, A. Barkworth, T. D. Akande, S. Hakak, and M. K. Khan, “Ransomware: Recent advances, analysis, challenges and future research directions,” Comput. Secur., vol. 111, p. 102490, 2021, doi: 10.1016/j.cose.2021.102490.
[8] A. K. Jain, S. R. Sahoo, and J. Kaubiyal, “Online social networks security and privacy: comprehensive review and analysis,” Complex Intell. Syst., vol. 7, no. 5, pp. 2157–2177, 2021, doi: 10.1007/s40747-021-00409-7.
[9] A. K. Jain, S. R. Sahoo, and J. Kaubiyal, “Online social networks security and privacy: comprehensive review and analysis,” Complex Intell. Syst., vol. 7, no. 5, pp. 2157–2177, 2021, doi: 10.1007/s40747-021-00409-7.
[10] M. Kuzlu, C. Fair, and O. Guler, “Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity,” Discov. Internet Things, vol. 1, no. 1, 2021, doi: 10.1007/s43926-020-00001-4.
[11] M. Kuzlu, C. Fair, and O. Guler, “Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity,” Discov. Internet Things, vol. 1, no. 1, 2021, doi: 10.1007/s43926-020-00001-4.
[12] C. A. Ismayanti and P. H. Rantelinggi, “Simulasi Penggunaan Blockchain Pada Keamanan Jaringan Internet Of Things Menggunakan Pin Emulator: Model Public Blockchain,” J. Teknol. Inf. dan Ilmu Komput., vol. 11, no. 2, pp. 235–242, 2024, doi: 10.25126/jtiik.20241126108.
[13] R. Umar, I. Riadi, and S. A. Wicaksono, “Security Analysis of Learning Management System Using Penetration Testing with ISSAF Framework,” PIKSEL Penelit. Ilmu Komput. Sist. Embed. Log., vol. 12, no. 1, pp. 59–68, 2024, doi: 10.33558/piksel.v12i1.8331.
[14] Sulistiadi and M. Salman, “Ransomware Attacks Threat Modeling Using Bayesian Network,” Digit. Zo. J. Teknol. Inf. dan Komun., vol. 14, no. 1, pp. 43–56, 2023, doi: 10.31849/digitalzone.v14i1.13788.
[15] F. A. Rafrastara, C. Supriyanto, C. Paramita, Y. P. Astuti, and F. Ahmed, “Performance Improvement of Random Forest Algorithm for Malware Detection on Imbalanced Dataset using Random Under-Sampling Method,” J. Inform. J. Pengemb. IT, vol. 8, no. 2, pp. 113–118, 2023, doi: 10.30591/jpit.v8i2.5207.
[16] P. N. Emmanuel and R. Maulany, “Penilaian Risiko Sistem Informasi Menggunakan Metode OCTAVE Allegro pada Indonesia Publishing House,” Krea-Tif J. Tek. Inform., vol. 11, no. 1, pp. 37–52, 2023, doi: 10.32832/krea-tif.v11i1.14179.
[17] O. Rivaldi and N. L. Marpaung, “Penerapan Sistem Keamanan Jaringan Menggunakan Intrusion Prevention System Berbasis Suricata,” INOVTEK Polbeng - Seri Inform., vol. 8, no. 1, p. 141, 2023, doi: 10.35314/isi.v8i1.3269.
[18] I. Tri Julianto, D. Kurniadi, R. Rohmanto, and F. Alisha Fauzia, “Improving Algorithm Performance using Feature Extraction for Ethereum Forecasting,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 8, no. 1, pp. 80–87, 2024, doi: 10.29207/resti.v8i1.4872.
[19] A. E. Pratiwi and H. N. L. Ermaya, “Implementation of Blockchain Technology on Accounting Information System For Transaction Security and Data Reliability,” JASa (Jurnal Akuntansi, Audit dan Sist. Inf. Akuntansi), vol. 8, no. 1, pp. 64–74, 2024, doi: 10.36555/jasa.v8i1.2419.
[20] Arif Indra Irawan, Iman Hedi Santoso, Istikmal, and Maya Rahayu, “Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms,” J. Nas. Tek. Elektro dan Teknol. Inf., vol. 13, no. 1, pp. 53–59, 2024, doi: 10.22146/jnteti.v13i1.4395.
[21] Y. Darmi, S. Fernandez, M. Y. Fathoni, and S. Wijayanto, “Evaluation of Governance in Information Systems Security to Minimize Information Technology Risks,” INTENSIF J. Ilm. Penelit. dan Penerapan Teknol. Sist. Inf., vol. 8, no. 1, pp. 40–51, 2024, doi: 10.29407/intensif.v8i1.21221.
[22] M. S. Hasibuan, “Evaluasi Tingkat Keamanan Informasi Pada Dinas Kominfo Lampung Selatan Menggunakan Indeks Kami 4 . 3 Evaluation of Information Security Level at The South Lampung Communications and Information Service Using the Kami 4 . 3 Index,” vol. 11.
[23] C. Umam and M. Muslih, “Enkripsi Data Teks Dengan AES dan Steganografi DWT,” InComTech J. Telekomun. dan Komput., vol. 13, no. 1, p. 28, 2023, doi: 10.22441/incomtech.v13i1.15059.
[24] R. Fachrurozy, M. Y. B. Setiadji, and D. F. Priambodo, “Embedded Wids Kismet Sebagai Perangkat Deteksi Serangan Data Link Layer Wi-Fi Access Point,” J. Inform. J. Pengemb. IT, vol. 8, no. 1, pp. 22–33, 2023, doi: 10.30591/jpit.v8i1.4551.
[25] R. C. S. IKetut Kasta Arya Wijaya, “JURNAL RESTI Development of an Early Warning System Using Social Media for Flood Disaster,” vol. 5, no. 158, pp. 169–180, 2026.
[26] H. Hartinah, A. W. Paundu, and A. A. Ilham, “Deteksi Malware Ransomware Berdasarkan Panggilan API dengan Metode Ekstraksi Fitur N-gram dan TF-IDF,” J. Edukasi dan Penelit. Inform., vol. 9, no. 1, p. 50, 2023, doi: 10.26418/jp.v9i1.58721.
[27] D. Y. D. Pratiwi and R. Adrian, “Deteksi Dan Mitigasi Serangan Distributed Denial of Service Pada Software Defined Network,” J. Tek. Inform. dan Sist. Inf., vol. 10, no. 1, pp. 63–75, 2024, doi: 10.28932/jutisi.v10i1.6995.
[28] T. Ernawati, Idham Kholid, Dahlan, and D. Rohmayani, “Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity,” J. Online Inform., vol. 9, no. 1, pp. 41–51, 2024, doi: 10.15575/join.v9i1.1254.
[29] N. Arifin, E. Saputra, T. K. Ahsyar, and F. Mutakkin, “Audit Keamanan Sistem Informasi Euclid Menggunakan Framework Cobit 5 pada PT. XYZ,” INOVTEK Polbeng - Seri Inform., vol. 8, no. 1, p. 103, 2023, doi: 10.35314/isi.v8i1.3229.
[30] M. K. Ridwan, W. F. Pattipeilohy, and S. Sanwani, “Aplikasi Keamanan Document Digital Menggunakan Algoritma Steganografi Discrete Cosine Transform (Dct) Pada Perusahan Alat Berat,” JITK (Jurnal Ilmu Pengetah. dan Teknol. Komputer), vol. 5, no. 2, pp. 177–182, 2020, doi: 10.33480/jitk.v5i2.1033.
[31] K. Isnaini, G. J. Nofita Sari, and A. P. Kuncoro, “Analisis Risiko Keamanan Informasi Menggunakan ISO 27005:2019 pada Aplikasi Sistem Pelayanan Desa,” J. Eksplora Inform., vol. 13, no. 1, pp. 37–45, 2023, doi: 10.30864/eksplora.v13i1.696.
[32] M. L. B. Hikam, F. Dewi, and D. Praditya, “Analisis Manajemen Risiko Informasi Menggunakan Iso/Iec 27005:2018 (Studi Kasus: Pt.Xyz),” JIPI (Jurnal Ilm. Penelit. dan Pembelajaran Inform., vol. 9, no. 2, pp. 728–734, 2024, doi: 10.29100/jipi.v9i2.4709.
[33] N. Ocha Safira, E. Wahyudi, and F. Khair, “Analisis Manajemen Bandwidth dan Keamanan Jaringan Menggunakan Metode Hierarchical Token Bucket dan Port Knocking Pada Router Mikrotik,” InComTech J. Telekomun. dan Komput., vol. 13, no. 2, p. 113, 2023, doi: 10.22441/incomtech.v13i2.17214.
[34] U. H. Panggabean and B. Soewito, “Analisis Keamanan Infrastruktur Jaringan Berdasarkan Cyber Kill Chain Framework,” JUSIFO (Jurnal Sist. Informasi), vol. 9, no. 1, pp. 33–44, 2023, doi: 10.19109/jusifo.v9i1.17365.