H-ASICS: Desain Intrusion Detection System Adaptif Berbasis Hybrid Deep Learning untuk Infrastruktur Kritis

Authors

  • Andri Yudha Pratama Universitas Teknologi Yogyakarta
  • Erik IH Ujianto Universitas Teknologi Yogyakarta
  • Rianto Rianto Universitas Teknologi Yogyakarta

DOI:

https://doi.org/10.37859/jf.v16i1.11006
Keywords: artificial intelligence, intrusion detection system, critical infrastructure, smart grid, SCADA

Abstract

The digital transformation of critical infrastructure, particularly Smart Grid and SCADA systems, has exposed new vulnerabilities to complex cyber-attacks such as False Data Injection (FDI), necessitating proactive defense mechanisms that transcend conventional approaches. Through a Systematic Literature Review (SLR) of 51 state-of-the-art studies (2022–2026), this research confirms a paradigm shift from static Deep Learning models toward adaptive, transparent, and decentralized detection ecosystems. Addressing the critical trade-off between high accuracy and operational latency, this study proposes the conceptual framework of H-ASICS (Hybrid Adaptive System for Infrastructure Critical Security). Based on a closed-loop MAPE-K architecture, H-ASICS dynamically selects the most optimal detection algorithms switching between Hybrid CNN-LSTM for complex spatial-temporal patterns and LightGBM for edge computing efficiency. Addressing the critical trade-off between high accuracy and operational latency, this study proposes the conceptual framework of H-ASICS (Hybrid Adaptive System for Infrastructure Critical Security). Based on a closed-loop MAPE-K architecture, H-ASICS dynamically selects the most optimal detection algorithms switching between Hybrid CNN-LSTM for complex spatial-temporal patterns (yielding up to 99.81% detection accuracy) and LightGBM for edge computing efficiency (reducing operational latency to under 10 ms). The superiority of H-ASICS is further reinforced by the integration of Explainable AI (XAI) and blockchain technology to guarantee the transparency of mitigation decisions and the immutability of cyber forensic data. This proposed architecture provides a strategic roadmap for next-generation security systems that are not only accurate and resilient but also highly accountable.

Downloads

Download data is not yet available.

References

B. Pradevi, I. W. Wibisono, and R. O. Seba, “Kebijakan Pemerintahan Joko Widodo dalam Menghadapi Ancaman Cyber di Sektor Infrastruktur Energi Indonesia,” SOSMANIORA (Jurnal Ilmu Sosial dan Humaniora), vol. 4, no. 3, pp. 908–917, Aug. 2025, doi: 10.55123/sosmaniora.v4i3.6424.

J. J. Hidayat, A. P. Werdana, and C. Setyowati, “Perancangan Sistem Deteksi Gas dan Suhu Berbasis Mikrokontroler IoT Menggunakan Metode Prototyping,” Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer), vol. 15, no. 2, pp. 398–407, 2025, doi: https://doi.org/10.37859/jf.v15i2.9173.

J. P. A. Yaacoub, H. N. Noura, O. Salman, and K. Chahine, “Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions,” Future Internet, vol. 17, no. 318, pp. 1–87, Jul. 2025, doi: 10.3390/fi17070318.

D. R. Sari, “Analisis Keamanan Sistem Informasi dalam Era Internet of Things (IoT),” Technologia Journal: Jurnal Informatika, vol. 1, no. 2, pp. 1–10, 2024, doi: 10.62872/v2tffe44.

M. T. Muslihi, “Pengembangan dan Evaluasi Sistem Monitoring Konsumsi Daya Listrik Berbasis IoT dengan Sensor PZEM-004T dan ESP8266,” Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer), vol. 15, no. 1, pp. 77–83, 2025, doi: https://doi.org/10.37859/jf.v15i1.8508.

D. Abraham, S. H. Houmb, and L. Erdodi, “Cyber-Attacks on Energy Infrastructure—A Literature Overview and Perspectives on the Current Situation,” Applied Sciences, vol. 15, no. 17, pp. 1–19, Aug. 2025, doi: 10.3390/app15179233.

Smart Idima, Philip Nwaga, and Patrick Evah, “Comprehensive Analysis of SCADA System Data for Intrusion Detection Using Machine Learning,” Global Journal of Engineering and Technology Advances, vol. 22, no. 2, pp. 064–089, Feb. 2025, doi: 10.30574/gjeta.2025.22.2.0027.

M. A. S. Arifin, Susanto, D. Stiawan, M. Y. Idris, and R. Budiarto, “The trends of supervisory control and data acquisition security challenges in heterogeneous networks,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 22, no. 2, pp. 874–883, Apr. 2021, doi: 10.11591/ijeecs.v22.i2.pp874-883.

International Telecommunication Union (ITU), “Global Cybersecurity Index 2024,” Geneva, 2024. Accessed: Dec. 16, 2025. [Online]. Available: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCIv5/2401416_1b_Global-Cybersecurity-Index-E.pdf

T. Nurhidayat et al., Kajian Ketahanan Siber: Manajemen Kerentanan. Bogor, Indonesia: Politeknik Siber dan Sandi Negara, 2024. Accessed: Dec. 16, 2025. [Online]. Available: https://poltekssn.ac.id/wp-content/uploads/2024/12/101224_Buku_Kajian_Ketahanan_Keamanan_Siber_Manajemen_Kerentanan-1.pdf

T. Yuliswar, I. Elfitri, and O. W. Purbo, “Optimization of Intrusion Detection System with Machine Learning for Detecting Distributed Attacks on Server,” Jurnal INOVTEK Polbeng - Seri Informatika, vol. 10, no. 1, pp. 367–376, Mar. 2025, doi: 10.35314/vem9da98.

K. Inayah and K. Ramli, “Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN,” Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 4, no. 11, pp. 867–876, Aug. 2024, doi: 10.25126/jtiik.1148911.

A. Alsaiari and M. Ilyas, “A HYBRID CNN-LSTM DEEP LEARNING MODEL FOR INTRUSION DETECTION IN SMART GRID,” International Journal of Artificial Intelligence & Applications (IJAIA), vol. 16, no. 5, pp. 01–22, Sep. 2025, doi: 10.5121/ijaia.2025.16501.

S. Ness, “Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures,” IEEE Access, vol. 13, pp. 16314–16323, 2025, doi: 10.1109/ACCESS.2024.3523409.

A. Balla, M. H. Habaebi, M. R. Islam, and S. Mubarak, “Applications of deep learning algorithms for Supervisory Control and Data Acquisition intrusion detection system,” Jul. 2022, Elsevier Ltd. doi: 10.1016/j.clet.2022.100532.

B. Kitchenham and S. M. Charter, “Guidelines for performing Systematic Literature Reviews in Software Engineering,” Durham, UK, 2007.

X. J. Li, M. Ma, and Y. Sun, “An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids,” Algorithms, vol. 16, no. 6, Jun. 2023, doi: 10.3390/a16060288.

S. Y. Diaba et al., “SCADA securing system using deep learning to prevent cyber infiltration,” Neural Networks, vol. 165, pp. 321–332, Aug. 2023, doi: 10.1016/j.neunet.2023.05.047.

P. Kumar, R. Kumar, A. Aljuhani, D. Javeed, A. Jolfaei, and A. K. M. N. Islam, “Digital twin-driven SDN for smart grid: A deep learning integrated blockchain for cybersecurity,” Solar Energy, vol. 263, Aug. 2023, doi: 10.1016/j.solener.2023.111921.

Y. Duan and Y. Zhang, “Enhancing smart grid security: A novel approach for efficient attack detection using SMART framework,” Measurement: Sensors, vol. 32, Jan. 2024, doi: 10.1016/j.measen.2023.101015.

F. Mesadieu, D. Torre, and A. Chennameneni, “Leveraging Deep Reinforcement Learning Technique for Intrusion Detection in SCADA Infrastructure,” IEEE Access, vol. 12, pp. 63381–63399, 2024, doi: 10.1109/ACCESS.2024.3390722.

S. Ness, “Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures,” IEEE Access, vol. 13, pp. 16314–16323, Jan. 2025, doi: 10.1109/ACCESS.2024.3523409.

J. E. Efiong, J. E. T. Akinsola, B. O. Akinyemi, E. A. Olajubu, and G. A. Aderounmu, “A contrived dataset of substation automation for cybersecurity research in the smart grid networks based on IEC61850,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 22, no. 5, pp. 1320–1330, Oct. 2024, doi: 10.12928/TELKOMNIKA.v22i5.26000.

D. T. Ha, N. X. Hoang, N. V. Hoang, N. H. Du, T. T. Huong, and K. P. Tran, “Explainable Anomaly Detection for Industrial Control System Cybersecurity,” in IFAC-PapersOnLine, Elsevier B.V., 2022, pp. 1183–1188. doi: 10.1016/j.ifacol.2022.09.550.

P. Patel and A. P. Salave, “AI-Driven Cybersecurity Framework for Next-Gen Computing Applications and Critical Infrastructure,” Communications, and Computing Summit, vol. 1, no. 1, pp. 1–10, Dec. 2023, [Online]. Available: https://doi.org/10.17051/ECC/01.01.01

S. Idima, P. Nwaga, and P. Evah, “Comprehensive Analysis of SCADA System Data for Intrusion Detection Using Machine Learning,” Global Journal of Engineering and Technology Advances, vol. 22, no. 2, pp. 064–089, Feb. 2025, doi: 10.30574/gjeta.2025.22.2.0027.

R. Ithaya, R. Shobana, A. K. Mishra, and J. B. Christinal, “CAD-IGMS: Cyber attack detection in an intelligent grid management system via the deep learning enhancing grid reliability,” Ain Shams Engineering Journal, vol. 16, no. 12, pp. 1–12, Oct. 2025, doi: 10.1016/j.asej.2025.103678.

S. Kabir, N. Hannan, A. Shufian, and M. S. R. Zishan, “Proactive detection of cyber-physical grid attacks: A pre-attack phase identification and analysis using anomaly-based machine learning models,” Array, vol. 27, pp. 1–18, Jun. 2025, doi: 10.1016/j.array.2025.100441.

R. Bhukya, S. A. Moeed, A. Medavaka, A. O. Khadidos, A. O. Khadidos, and S. Selvarajan, “SPARK and SAD: Leading-edge deep learning frameworks for robust and effective intrusion detection in SCADA systems,” International Journal of Critical Infrastructure Protection, vol. 49, pp. 1–24, Mar. 2025, doi: 10.1016/j.ijcip.2025.100759.

A. O. Khadidos, A. O. Khadidos, S. Selvarajan, T. Al-Shehari, N. A. Alsadhan, and S. Singh, “CyberSentry: Enhancing SCADA security through advanced deep learning and optimization strategies,” International Journal of Critical Infrastructure Protection, vol. 50, pp. 1–23, Jun. 2025, doi: 10.1016/j.ijcip.2025.100782.

M. A. A. Sarker, B. Shanmugam, S. Azam, and S. Thennadil, “Enhancing smart grid load forecasting: An attention-based deep learning model integrated with federated learning and XAI for security and interpretability,” Intelligent Systems with Applications, vol. 23, pp. 1–17, Aug. 2024, doi: 10.1016/j.iswa.2024.200422.

Z. Zhang et al., “A survey on resilient microgrid system from cybersecurity perspective,” Appl. Soft Comput., vol. 175, pp. 1–18, Apr. 2025, doi: 10.1016/j.asoc.2025.113088.

K. S. Rao et al., “Unveiling CyberFortis: A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer,” Computers, Materials and Continua, vol. 85, no. 1, pp. 1899–1916, Aug. 2025, doi: 10.32604/cmc.2025.064728.

E. Altamimi, A. Al-Ali, A. K. Al-Ali, and Q. M. Malluhi, “Distribution-based residual analysis of load forecasting for enhanced anomaly detection,” International Journal of Electrical Power and Energy Systems, vol. 173, pp. 1–13, Dec. 2025, doi: 10.1016/j.ijepes.2025.111435.

M. Alanazi, A. Mahmood, and M. J. M. Chowdhury, “ICS-LTU2022: A dataset for ICS vulnerabilities,” Comput. Secur., vol. 148, pp. 1–28, Oct. 2024, doi: 10.1016/j.cose.2024.104143.

S. A. Oyedotun, G. P. Oise, and C. E. Ozobialu, “Towards Intelligent Cybersecurity in SCADA and DCS Environments: Anomaly Detection Using Multimodal Deep Learning and Explainable AI,” Journal of Science Research and Reviews, vol. 2, no. 3, pp. 20–31, Jul. 2025, doi: 10.70882/josrar.2025.v2i3.76.

G. Aldehim, S. Basheer, A. S. Alluhaidan, and S. Sakri, “Robust False Data Injection Identification Framework for Power Systems Using Explainable Deep Learning,” Computers, Materials and Continua, vol. 85, no. 2, pp. 3599–3619, Sep. 2025, doi: 10.32604/cmc.2025.065643.

D. F. Valderrama et al., “An online intrusion detection system for photovoltaic generators through physics-based neural networks,” Electric Power Systems Research, vol. 253, pp. 1–9, Dec. 2025, doi: 10.1016/j.epsr.2025.112528.

M. M. Pranav, R. S., R. D. A. Raj, A. Pallakonda, R. M. R. Yanamala, and K. P. K., “Smart grid cybersecurity against power system MiTM threats and machine learning-based attack classification,” Energy Reports, vol. 15, pp. 1–23, Jan. 2026, doi: 10.1016/j.egyr.2025.12.035.

X. Sun et al., “A Hierarchical Federated Learning-Based Intrusion Detection System for 5G Smart Grids,” Electronics (Basel)., vol. 11, no. 16, p. 2627, 2022, doi: 10.3390/electronics11162627.

A. Kumari et al., “AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System,” Mathematics, vol. 10, no. 16, p. 2852, 2022, doi: 10.3390/math10162852.

N. Tariq, A. Alsirhani, M. Humayun, F. Alserhani, and M. Shaheen, “A fog-edge-enabled intrusion detection system for smart grids,” Journal of Cloud Computing, vol. 13, no. 43, 2024, doi: 10.1186/s13677-024-00609-9.

A. R. Singh et al., “AI-enhanced smart grid framework for intrusion detection and mitigation in EV charging stations,” Alexandria Engineering Journal, vol. 115, pp. 603–621, 2025, doi: 10.1016/j.aej.2024.12.061.

R. Shrestha et al., “Anomaly detection based on LSTM and autoencoders using federated learning in smart electric grid,” J. Parallel Distrib. Comput., vol. 193, pp. 1–13, 2024, doi: 10.1016/j.jpdc.2024.104951.

R. Trivedi, S. Patra, and S. Khadem, “Data-centric explainable artificial intelligence techniques for cyber-attack detection in microgrid networks,” Energy Reports, vol. 13, pp. 217–229, 2025, doi: 10.1016/j.egyr.2024.11.075.

M. Barbhaya, P. R. Dasari, S. K. Damarla, R. Srinivasan, and B. Huang, “A deep learning framework for cyberattack detection and classification in Industrial Control Systems,” Comput. Chem. Eng., vol. 202, pp. 1–16, Nov. 2025, doi: 10.1016/j.compchemeng.2025.109278.

U. Islam, H. Ullah, N. Khan, K. Saleem, and I. Ahmad, “AI-enhanced intrusion detection in smart renewable energy grids: A novel industry 4.0 cyber threat management approach,” International Journal of Critical Infrastructure Protection, vol. 50, no. 1, pp. 1–16, 2025, doi: 10.1016/j.ijcip.2025.100769.

M. Ammar, N. Javaid, A. K. J. Saudagar, and I. Ahmed, “An optimized Deep and Active Learning oriented framework for intrusion detection in Internet of Sensor Things,” Ain Shams Engineering Journal, vol. 16, pp. 1–28, 2025, doi: 10.1016/j.asej.2025.103607.

A. Sharma, S. Rani, and M. Shabaz, “Artificial intelligence-augmented smart grid architecture for cyber intrusion detection and mitigation in electric vehicle charging infrastructure,” Sci. Rep., vol. 15, no. 1, pp. 1–19, Dec. 2025, doi: 10.1038/s41598-025-04984-4.

W. Ishtiaq, A. Zannat, A. H. M. S. Parvez, M. A. Hossain, M. H. Kanchan, and M. M. Tarek, “CST-AFNet: A dual attention-based deep learning framework for intrusion detection in IoT networks,” Array, vol. 27, pp. 1–9, 2025, doi: 10.1016/j.array.2025.100501.

A. Mahboob, M. Rashad, G. Abbas, Z. Mushtaq, T. Mazhar, and A. U. Rehman, “Fortifying Industry 4.0 Solar Power Systems: A Blockchain-Driven Cybersecurity Framework with Immutable LightGBM,” Computers, Materials and Continua, vol. 85, no. 2, pp. 3805–3823, 2025, doi: 10.32604/cmc.2025.067615.

A. Alsirhani, N. Tariq, M. Humayun, G. Naif Alwakid, and H. Sanaullah, “Intrusion detection in smart grids using artificial intelligence-based ensemble modelling,” Cluster Comput., vol. 28, no. 4, pp. 1–22, 2025, doi: 10.1007/s10586-024-04964-9.

A. Villafranca and M.-D. Cano, “A hybrid inference pipeline for IDS: Combining DNNs and XGBoost through stacking for real-world intrusion detection,” Ad Hoc Networks, vol. 188, p. 104227, 2026, doi: 10.1016/j.adhoc.2026.104227.

A. Salehiyan, N. Serrano, F. Hernando-Gallego, D. Martín, and J. V. Álvarez-Bravo, “A Novel Evolutionary Optimized Transformer-Deep Reinforcement Learning Framework for False Data Injection Detection in Industry 4.0 Smart Water Infrastructures,” Computers, Materials and Continua, vol. 87, no. 2, p. 68, 2026, doi: 10.32604/cmc.2026.075336.

J. H. Kim, K. S. Son, J. G. Song, Y. G. Lee, and Y. J. Lee, “A study on process information-driven cyber threat detection for I&C systems in NPP,” Nuclear Engineering and Technology, vol. 58, no. 1, p. 103879, 2026, doi: 10.1016/j.net.2025.103879.

J. He, Y. Zheng, S. Lei, F. Liao, and L. Wu, “Cyber–physical intrusion detection for coordinated renewable energy and storage systems,” Array, vol. 30, p. 100765, 2026, doi: 10.1016/j.array.2026.100765.

N. M, A. N. V, B. S. P, and B. S, “Decentralized cybersecurity in smart grids: Leveraging location-fedavg for rapid threat detection and adaptive resilience,” Results in Engineering, vol. 29, p. 108518, 2026, doi: 10.1016/j.rineng.2025.108518.

H. Su, X. Zhang, L. Zheng, X. Shen, and H. Liao, “Deep Feature-Driven Hybrid Temporal Learning and Instance-Based Classification for DDoS Detection in Industrial Control Networks,” Computers, Materials and Continua, vol. 86, no. 3, pp. 1–26, 2026, doi: 10.32604/cmc.2025.072093.

D. Javaheri, H. Chizari, M. Fahmideh, M. H. Nadimi-Shahraki, and J. Hur, “DeepRadar: A cyber-defence interceptor for early warning and defusing malware injection attacks,” Knowl. Based. Syst., vol. 331, 2026, doi: 10.1016/j.knosys.2025.114830.

M. S. Harish, S. Lokesh, P. Sakthivel, and B. Akshaya, “Hybrid deep learning model for network intrusion detection using optimal feature fusion,” Ain Shams Engineering Journal, vol. 17, no. 1, pp. 1–29, 2026, doi: 10.1016/j.asej.2025.103904.

S. H. Mohammed et al., “IG-APSO-DNN: Deep learning intrusion detection model to detect false data injection attacks in smart grids,” Ad Hoc Networks, vol. 180, pp. 1–14, 2026, doi: 10.1016/j.adhoc.2025.104053.

H. Moayyed et al., “Innovative defense strategies: Fusion deep learning approach to counter false data injection attacks in power systems,” Reliab. Eng. Syst. Saf., vol. 268, pp. 1–19, 2026, doi: 10.1016/j.ress.2025.112003.

O. B. J. Rabie, S. Selvarajan, D. Alghazzawi, A. Kumar, S. Hasan, and M. Z. Asghar, “A security model for smart grid SCADA systems using stochastic neural network,” IET Generation, Transmission and Distribution, vol. 17, no. 20, pp. 4541–4553, 2023, doi: 10.1049/gtd2.12943.

H. Naeem, F. Ullah, and G. Srivastava, “Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization,” Expert Syst., vol. 42, no. 1, 2025, doi: 10.1111/exsy.13556.

Downloads

Published

2026-05-03