Keamanan Siber Menggunakan Kecerdasan Buatan: Tinjauan Pustaka

Authors

  • Muhamad Aria Armada Djojosugito Universitas Sains Indonesia
  • Miri Ardiansyah Universitas Sains Indonesia

DOI:

https://doi.org/10.31004/riggs.v4i3.2549

Keywords:

Kecerdasan Buatan, Keamanan Siber, Model AI

Abstract

Kecerdasan Buatan memiliki manfaat dan kegunaan yang dapat disesuaikan dalam berbagai bidang. Dengan kemampuan kecerdasan buatan (AI) yang semakin maju, manfaat dan kegunaan dari kecerdasan buatan akan semakin meningkat pesat. Salah satu bidang dimana kecerdasan buatan dapat digunakan adalah keamanan siber. Dengan metode tinjauan pustaka, makalah penelitian ini meneliti berbagai cetusan ide penelitian dan eksperimen yang sudah dilakukan oleh berbagai penelitian-penelitian sebelumnya untuk membandingkan manfaat serta kelemahan dari penelitian-penelitian tersebut. Dari tinjauan pustaka yang dilaksakan, ditemukan bahwa AI memberikan deteksi ancaman akurasi tinggi, pengawasan real-time yang meningkat, serta otomasi yang mendukung kemampuan manusia. Kekurangan dari AI berada di kebutuhan yang tinggi akan data berkualitas, kebutuhan sumber daya perhitungan AI yang tinggi dengan waktu latihan model AI yang lama, serta kebutuhan komputasi yang tinggi. Sebagai penutup, penelitian ini merekomendasikan agar penelitian mengenai penggunaan kecerdasan buatan dalam mengamankan dunia siber dari serangan agar terus ditingkatkan dan lebih dikreatifkan.

Downloads

Download data is not yet available.

References

C. Novelli, F. Casolari, P. Hacker, G. Spedicato, and L. Floridi, “Generative AI in EU law: Liability, privacy, intellectual property, and cybersecurity,” Computer Law & Security Review, vol. 55, p. 106066, Nov. 2024, doi: 10.1016/j.clsr.2024.106066.

M. Adil, H. Song, S. Mastorakis, H. Abulkasim, A. Farouk, and Z. Jin, “UAV-Assisted IoT Applications, Cybersecurity Threats, AI-Enabled Solutions, Open Challenges With Future Research Directions,” IEEE Transactions on Intelligent Vehicles, vol. 9, no. 4, pp. 4583–4605, Apr. 2024, doi: 10.1109/TIV.2023.3309548.

M. Hofstetter, R. Riedl, T. Gees, A. Koumpis, and T. Schaberreiter, “Applications of AI in cybersecurity,” in Proceedings - 2020 2nd International Conference on Transdisciplinary AI, TransAI 2020, Institute of Electrical and Electronics Engineers Inc., Sep. 2020, pp. 138–141. doi: 10.1109/TransAI49837.2020.00031.

N. Mohamed, “Current trends in AI and ML for cybersecurity: A state-of-the-art survey,” Cogent Eng, vol. 10, no. 2, 2023, doi: 10.1080/23311916.2023.2272358.

F. Kamoun, F. Iqbal, M. A. Esseghir, and T. Baker, “AI and machine learning: A mixed blessing for cybersecurity,” in 2020 International Symposium on Networks, Computers and Communications, IEEE, Oct. 2020. doi: 10.1109/ISNCC49221.2020.9297323.

L. Ofusori, T. Bokaba, and S. Mhlongo, “Artificial Intelligence in Cybersecurity: A Comprehensive Review and Future Direction,” Applied Artificial Intelligence, vol. 38, no. 1, Dec. 2024, doi: 10.1080/08839514.2024.2439609.

I. Wiafe, F. N. Koranteng, E. N. Obeng, N. Assyne, A. Wiafe, and S. R. Gulliver, “Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature,” IEEE Access, vol. 8, pp. 146598–146612, 2020, doi: 10.1109/ACCESS.2020.3013145.

D. Jain, D. Choudhary, A. Anand, N. K. Trivedi, V. Gautam, and S. K. Mohapatra, “Cybersecurity Solutions Using AI Techniques,” in 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2022, Institute of Electrical and Electronics Engineers Inc., 2022. doi: 10.1109/ICRITO56286.2022.9965045.

I. Bala, M. M. Mijwil, G. Ali, and E. Sadıkoğlu, “Analysing the Connection Between AI and Industry 4.0 from a Cybersecurity Perspective: Defending the Smart Revolution,” Mesopotamian Journal of Big Data, pp. 63–69, Jun. 2023, doi: 10.58496/mjbd/2023/009.

J. Ali et al., “A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks,” Comput Commun, vol. 229, Jan. 2025, doi: 10.1016/j.comcom.2024.108000.

B. Bowman and H. H. Huang, “Towards Next-Generation Cybersecurity with Graph AI,” Operating Systems Review (ACM), vol. 55, no. 1, pp. 61–67, Jul. 2021.

A. Dalal, “Cybersecurity And Artificial Intelligence- How AI Is Being Used In Cybersecurity To Improve Detection And Response To Cyber Threats,” Turkish Journal of Computer and Mathematics Education, vol. 9, pp. 1704–1709, 2018.

D. Saxena, I. Gupta, R. Gupta, A. K. Singh, and X. Wen, “An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity,” IEEE Trans Syst Man Cybern Syst, vol. 53, no. 11, pp. 6815–6827, Nov. 2023, doi: 10.1109/TSMC.2023.3288081.

A. H. Salem, S. M. Azzam, O. E. Emam, and A. A. Abohany, “Advancing cybersecurity: a comprehensive review of AI-driven detection techniques,” J Big Data, vol. 11, no. 1, Dec. 2024, doi: 10.1186/s40537-024-00957-y.

J. Kim and N. Park, “Blockchain-based data-preserving AI learning environment model for AI cybersecurity systems in IoT service environments,” Applied Sciences (Switzerland), vol. 10, no. 14, Jul. 2020, doi: 10.3390/app10144718.

R. Kaur, D. Gabrijelčič, and T. Klobučar, “Artificial intelligence for cybersecurity: Literature review and future research directions,” Information Fusion, vol. 97, Sep. 2023, doi: 10.1016/j.inffus.2023.101804.

I. Jada and T. O. Mayayise, “The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review,” Data Inf Manag, vol. 8, no. 2, Jun. 2024, doi: 10.1016/j.dim.2023.100063.

M. Sankaram, M. Roopesh, S. Rasetti, and N. Nishat, “A COMPREHENSIVE REVIEW OF ARTIFICIAL INTELLIGENCE APPLICATIONS IN ENHANCING CYBERSECURITY THREAT DETECTION AND RESPONSE MECHANISMS,” GLOBAL MAINSTREAM JOURNAL, vol. 3, no. 5, pp. 1–14, Jul. 2024, doi: 10.62304/jbedpm.v3i05.180.

S. K. Sharma, “AI-Enhanced Cyber Threat Detection and Response Systems,” Shodh Sagar Journal of Artificial Intelligence and Machine Learning, vol. 1, no. 2, pp. 43–48, 2024, doi: 10.36676/ssjaiml.v1.i2.14.

W. S. Ismail, “Threat Detection and Response Using AI and NLP in Cybersecurity,” Journal of Internet Services and Information Security, vol. 14, no. 1, pp. 195–205, Feb. 2024, doi: 10.58346/JISIS.2024.I1.013.

R. Vadisetty, “The Effects of Cyber Security Attacks on Data Integrity in AI,” in Intelligent Computing and Emerging Communication Technologies, ICEC 2024, Institute of Electrical and Electronics Engineers Inc., 2024. doi: 10.1109/ICEC59683.2024.10837148.

M. Abdullahi et al., “Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review,” Jan. 01, 2022, MDPI. doi: 10.3390/electronics11020198.

N. Capodieci, C. Sanchez-Adames, J. Harris, and U. Tatar, “The Impact of Generative AI and LLMs on the Cybersecurity Profession,” in 2024 Systems and Information Engineering Design Symposium, SIEDS 2024, Institute of Electrical and Electronics Engineers Inc., 2024, pp. 448–453. doi: 10.1109/SIEDS61124.2024.10534674.

B. Jalaian and N. D. Bastian, “Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning,” in MILCOM 2023 - 2023 IEEE Military Communications Conference: Communications Supporting Military Operations in a Contested Environment, Institute of Electrical and Electronics Engineers Inc., 2023, pp. 268–273. doi: 10.1109/MILCOM58377.2023.10356283.

A. Jaber and L. Fritsch, “Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators,” in Lecture Notes in Networks and Systems, Springer Science and Business Media Deutschland GmbH, 2023, pp. 249–257. doi: 10.1007/978-3-031-19945-5_25.

Downloads

Published

28-08-2025

How to Cite

[1]
M. A. A. Djojosugito and M. Ardiansyah, “Keamanan Siber Menggunakan Kecerdasan Buatan: Tinjauan Pustaka ”, RIGGS, vol. 4, no. 3, pp. 3835–3841, Aug. 2025.