Improving Cybersecurity Resilience in Indonesian Cloud Infrastructures Through AI‑Based Threat Intelligence

Main Article Content

Manase Sahat H Simarangkir

Abstract

The rapid expansion of cloud computing adoption in Indonesia has significantly increased organizational exposure to cyber threats, making cybersecurity resilience a critical strategic priority. This study examines the role of Artificial Intelligence (AI)-based threat intelligence in enhancing cybersecurity resilience within Indonesian cloud infrastructure. Using a quantitative research design, data were collected from 155 respondents consisting of IT managers, cloud engineers, and cybersecurity practitioners through a structured Likert-scale questionnaire. The data were analyzed using Structural Equation Modeling–Partial Least Squares (SEM-PLS 3). The results indicate that AI-based threat intelligence has a significant positive effect on threat detection accuracy and response effectiveness. Both threat detection accuracy and response effectiveness also have significant positive effects on cybersecurity resilience. Furthermore, AI-based threat intelligence directly strengthens cybersecurity resilience and indirectly enhances it through the mediation of threat detection accuracy and response effectiveness. These findings confirm that AI-driven cybersecurity systems play a strategic role in improving adaptive defense capabilities, accelerating incident response, and strengthening organizational resilience in cloud environments. This study provides important implications for policymakers, cloud service providers, and organizations in designing intelligent cybersecurity frameworks to support Indonesia’s sustainable digital transformation.

Article Details

How to Cite
Simarangkir, M. S. H. (2025). Improving Cybersecurity Resilience in Indonesian Cloud Infrastructures Through AI‑Based Threat Intelligence. The Eastasouth Journal of Information System and Computer Science, 3(02), 227–241. https://doi.org/10.58812/esiscs.v3i02.861
Section
Articles

References

R. A. Sunarjo et al., “Addressing Cybersecurity Risks in Multi Cloud Environments for Digital Transformation,” in 2025 4th International Conference on Creative Communication and Innovative Technology (ICCIT), 2025, pp. 1–6.

G. Lambropoulos, S. Mitropoulos, and C. Douligeris, “A Review on Cloud Computing services, concerns, and security risk awareness in the context of Digital Transformation,” in 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), 2021, pp. 1–6.

M. E. Abimanyu, S. Ratnaningtyas, and S. Hutajulu, “Cloud Computing Adoption Strategy for Government Sector in Indonesian Cloud Industry,” Int. J. Bus. Technol. Manag., vol. 6, no. 2, pp. 438–444, 2024.

M. Natti, “Cloud and on-premise DBaaS (Database as a Service) - PostgreSQL Database Deployments automation,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 9, no. 2, pp. 772–776, 2023.

T. Haryanti, N. A. Rakhmawati, and A. P. Subriadi, “Navigating the Digital Transformation Landscape in Indonesia: A Qualitative Sectoral Analysis,” in 2024 IEEE International Symposium on Consumer Technology (ISCT), 2024, pp. 805–811.

J. M. DWI, K. W. IDK, S. ADI, W. PUJO, and K. KUSUMA, “Digital World Threat Preparedness For Digital Transformation Acceleration Policy In Indonesia,” Int. J., vol. 4, no. 1, 2024.

V. Jyothsna, E. Sandhya, K. B. Kamalapuram, and P. Bhasha, “AI-Driven Threat Detection in Cloud Environments,” in Convergence of Cybersecurity and Cloud Computing, IGI Global Scientific Publishing, 2025, pp. 261–284.

C. Harshvardhan And C. Pratikkumar, “Enhancing cybersecurity in cloud environments using AI-driven threat detection and response,” Int. J., vol. 3, no. 1, pp. 13–30, 2024.

D. Chaudhary, S. K. Verma, V. M. Shrimal, R. Madala, and R. Baliyan, “Ai-based methods to detect and counter cyber threats in cloud environments to strengthen cloud security,” in 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT), 2024, vol. 1, pp. 1–6.

A. B. Dorothy, B. Madhavidevi, B. Nachiappan, G. Manikandan, P. K. Patjoshi, and M. Sindhuja, “AI-Driven Threat Intelligence in Cloud Computing Detecting and Responding to Cyber Attacks,” in 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), 2024, pp. 1–6.

P. Chuwattanakul, Perceived leadership style, style flexibility, and style effectiveness of government hospital administrators in Thailand. Andrews University, 1993.

X. Sun, P. Liu, and A. Singhal, “Toward cyberresiliency in the context of cloud computing [resilient security],” IEEE Secur. Priv., vol. 16, no. 6, pp. 71–75, 2018.

K. AGUS, “Study of the Artificial Intelligence Role in Achieving Cybersecurity for Critical Information Infrastructure,” MONAS J. Inov. Apar. Учредители Badan Pengemb. Sumber Daya Mns. Provinsi DKI Jakarta, vol. 6, no. 2, pp. 154–165, 2024.

K. Saraswati, B. Purwandari, and N. W. Trisnawaty, “Investigating Challenges in Information Security Governance Implementation in Key Sectors: A Cross-Country Comparative Analysis,” Indones. J. Comput. Sci., vol. 14, no. 2, 2025.

R. Kurniawan, A. Subroto, and E. Daryanto, “A Systematic Literature Review of Organizational Resilience In Indonesia,” Asian J. Eng. Soc. Heal., vol. 3, no. 4, pp. 893–902, 2024.

M. J. Islami, “Tantangan Dalam Implementasi Strategi Keamanan Siber Nasional Indonesia Ditinjau Dari Penilaian Global Cybersecurity Index,” Masy. Telemat. Dan Inf. J. Penelit. Teknol. Inf. Dan Komun., vol. 8, no. 2, pp. 137–144, 2018.

S. S. Aulianisa and I. Indirwan, “Critical review of the urgency of strengthening the implementation of cyber security and resilience in Indonesia,” Lex Sci. Law Rev., vol. 4, no. 1, pp. 31–45, 2020.

M. Akinsanya, “Next-Generation Cyber Resilience Frameworks: Enhancing Security, Recovery, And Continuity In Modern Networked Systems,” Int. J. Sci. Technol., vol. 3, no. 1, pp. 1–14, 2024.

N. Parvatha, “Resilient cybersecurity frameworks for multi-cloud environment: Innovations in securing distributed systems against emerging threats,” Int. J. Sci. Res. Arch., vol. 3, no. 1, pp. 266–275, 2021.

R. C. Srinivas, “Ai-Driven Security Posture Management: A Revolutionary Approach To Multi-Cloud Enterprise Security,” Int. J., vol. 11, no. 1, pp. 497–509, 2025.

A. Singhal, P. Liu, and X. Sun, “Towards Cyber Resiliency in the Context of Cloud Computing”.

V. Kiranmai and A. Manikandan, “Global Journal of Engineering Innovations & Interdisciplinary Research Original Article A Study on AI-Powered Threat Intelligence Systems for Proactive Cyber Defence,” vol. 5, no. 5, pp. 1–4, 2025.

C. Ucheji, J. Ekeneme, and C. Ezekwem, “Global Trends in AI-Driven Cybersecurity: A Systematic and Bibliometric Analysis,” Asian J. Res. Comput. Sci., vol. 18, no. 9, pp. 103–115, 2025.

M. M. Rahman, K. Dhakal, N. Gony, M. K. Shuvra, and M. Rahman, “AI integration in cybersecurity software: Threat detection and response,” Int. J. Innov. Res. Sci. Stud. [Internet], pp. 3907–3921, 2025.

R. Sissodia, M. S. Rauthan, V. Barthwal, and V. Dwivedi, “Artificial Intelligence (AI) in Cybersecurity,” Adv. Cybersecurity Smart Factories Through Auton. Robot. Defenses, pp. 121–152, 2025.

S. Thapaliya, “Artificial Intelligence and Cybersecurity: Pioneering Next-Generation Protection Strategies,” SADGAMAYA, vol. 2, no. 1, pp. 61–65, 2025.

M. Sameer and F. M. Khan, “AI Threat Detection,” 2025.

S. Oduri, “AI-Powered threat detection in cloud environments,” Int. J. Recent Innov. Trends Comput. Commun., vol. 9, no. 12, pp. 57–62, 2021.

D. G. Patel and S. R. Pujari, “AI-driven incident response in cloud security,” 2025.

M. A. M. Farzaan, M. C. Ghanem, A. El-Hajjar, and D. N. Ratnayake, “Ai-enabled system for efficient and effective cyber incident detection and response in cloud environments,” arXiv Prepr. arXiv2404.05602, 2024.

S. Tatineni, “AI-infused threat detection and incident response in cloud security,” Int. J. Sci. Res., vol. 12, no. 11, pp. 998–1004, 2023.

S. Sood and A. Kim, “The Golden Age of the Big Data Audit: Agile Practices and Innovations for E-Commerce, Post-Quantum Cryptography, Psychosocial Hazards, Artificial Intelligence Algorithm Audits, and Deepfakes,” Int. J. Innov. Econ. Dev., vol. 9, no. 2, pp. 7–23, 2023, doi: 10.18775/ijied.1849-7551-7020.2015.92.2001.

P. J. Nesse, H. S. Hallingby, and ..., “Validation of 5G use case solutions–Simultaneous assessment of business value and social acceptance in early stages of the research and innovation …,” … and Technology. journal.riverpublishers.com, 2023.

O. A. Farayola, “Revolutionizing banking security: integrating artificial intelligence, blockchain, and business intelligence for enhanced cybersecurity,” Financ. Account. Res. J., vol. 6, no. 4, pp. 501–514, 2024.

A. K. Ahmed and A. A. Khorsheed, “Open network structure and smart network to sharing cybersecurity within the 5G network,” Indonesian Journal of Electrical …. researchgate.net, 2022.