JURNAL RESISTOR | ISSN 2598-7542 | E-ISSN 2598-9650 Vol. 3 No 1 Ae April 2020 | https://s. id/jurnalresistor DOI: https://doi. org/10. Publishing: Prahasta Publisher Analysis of Physical Security and Comprehensive Approach Based on Artificial Intelligence Method Siti Alvi Sholikhatin1. Alif Nur Fadilah2. Rashif Syaddad3 Digital Business. Faculty of Business and Social Studies. Amikom Purwokerto University Purwokerto. Indonesia Informatics. Faculty of Computer Studies Amikom Purwokerto University Purwokerto. Indonesia e-mail: sitialvi@amikompurwokerto. id1 , alifnurfadilah484@gmail. ,rashifsyaddad518@gmail. Received : March, 2025 Accepted : April, 2025 Published : April, 2025 Abstract Cybersecurity sets as an emerging issue in the recent years, in line with the development of increasingly sophisticated digital technology. Cybersecurity are divided into several areas that are equally important and interconnected to one another. One of the areas of cybersecurity is physical security. Physical security involves safeguarding personnel, hardware, software, networks, and data against physical actions and incidents that may lead to significant loss or harm to an organization, agency, or institution. Several methods are conducted to secure the area physical assets, and AI-based method is currently wellknown for its effectiveness. In this research, we aim to proposed an AI-based method to improve the physical security. This research is conducted to analyze and propose a method in the area of physical The goals are to secure the physical assets, predict potential attacks, and manage the vulnerable risks. The results of this research are the proposed prototype to secure physical area of information system and able to detect unusual activities to prevent incident that can be harmful of physical sources. Keywords: Physical security. Artificial intelligence. Cybersecurity. Information security Abstrak Keamanan siber menjadi isu yang berkembang dalam beberapa tahun terakhir, seiring dengan perkembangan teknologi digital yang semakin canggih. Keamanan siber dibagi menjadi beberapa area yang sama pentingnya dan saling berhubungan satu sama lain. Salah satu area keamanan siber adalah keamanan fisik. Keamanan fisik adalah perlindungan personel, perangkat keras, perangkat lunak, jaringan, dan data dari tindakan dan kejadian fisik yang dapat menyebabkan kerugian atau kerusakan serius pada suatu perusahaan, instansi, atau lembaga. Beberapa metode dilakukan untuk mengamankan aset fisik area, dan metode berbasis AI saat ini terkenal dengan keefektifannya. Dalam penelitian ini, kami bertujuan untuk mengusulkan metode berbasis AI untuk meningkatkan keamanan RESISTOR Journal | 1 fisik. Penelitian ini dilakukan untuk menganalisis dan mengusulkan sebuah metode di bidang keamanan Tujuannya adalah untuk mengamankan aset fisik, memprediksi potensi serangan, dan mengelola risiko yang rentan. Hasil dari penelitian ini adalah prototipe yang diusulkan untuk mengamankan area fisik sistem informasi dan mampu mendeteksi aktivitas yang tidak biasa untuk mencegah insiden yang dapat membahayakan sumber fisik. Kata Kunci: Keamanan fisik. Kecerdasan buatan. Keamanan siber. Keamanan informasi INTRODUCTION In the recent years, according to DataIndonesia. BSSN Indonesia received 370. 02 million cyber attacks in 2022 . This number increased by 38. from the previous year, which amounted to 74 million cyberattacks. Cybersecurity need to be addressed seriously in order to ensure that Indonesia is secure from cyber Cybersecurity have been evolving rapidly, but unfortunately, cybercriminals are also using updated technology to launch increasingly sophisticated cyberattacks while hiding their tracks . Cybersecurity are divided into several field: network security, physical security, and computer security. These areas are interconnected and equally important in the system. The cybersecurity system is defined as a set of processes, human beings and systems which assist in the protection of electronic resources. Artificial intelligence is an idea that mirrors human cerebrum and seeks to explore realworld issues in a holistic way. Artificial intelligence, which provides tools to solve complex and stressful problems, can be described as performance technology. Artificial intelligence is a combination of data innovation and physical intelligence that can be used electronically to achieve the objectives. AIbased system has been developed in many areas to make life easier for humans. In the area of cybersecurity. AI can be developed to detect threat, predict the security risks, and even prevent attacks. Artificial intelligence does not only pose threats and dangers, it can also be used to solve problems. Information flow and operational direction are used to detect, prevent and identify cyber-attacks . The research conducted by Sarvesh Kumar . stated that AI innovation is playing an progressively imperative part in driving computerization in cyber security. mechanizing numerous of the schedule and unremarkable errands related with cyber 2 | RESISTOR Journal security. AI empowers security work force to center on more key viewpoints of their work, such as danger examination and occurrence One range where AI is having a critical affect is within the computerization of danger Utilizing progressed machine learning calculations. AI-powered apparatuses can naturally examine tremendous sums of information to identify potential security This will offer assistance security groups rapidly identify and react to developing dangers, decreasing the hazard of an effective In expansion to danger discovery. AI is additionally being utilized to robotize other perspectives of cybersecurity, such as For illustration. AI-powered devices can consequently examine security episodes to decide the foremost fitting reaction, or consequently check frameworks for vulnerabilities and propose remediation The following research is conducted by Yao Jun . indicates that an assessment of IoT facilitating technologies, and upcoming challenges related to technological upgrades. The research has also examined the structure of the IoTs, which comprises the perception layer, transmission layer, application layer, and network management. Furthermore, it examines the facilitating technologies of the IoTs, which encompass application domain, middleware domain, network domain, and object domain. This research has examined the function of IoTs and their usage in people's daily lives through the creation of smart cities, smart agriculture, waste management, retail and logistics, as well as a smart environment. The third research is conducted by Meraj Farheen Ansari . shows that while AI helps the security team save time, it still needs human experts for creative tasks, thereby simplifying their work. The restriction requires developers to ensure that the technology is endowed with various functions to manage any crime arising from their limitations. This study aims to examine and suggest a technique within the field of physical security. The goals are to secure the physical assets, predict potential attacks, and manage the vulnerable risks. The object of this research is university X that currently experienced fire in information system physical assets. The incident caused huge losses, loss of critical data assets, and caused delays in several academic activities involving the system. RESEARCH METHOD The flow of this research can be seen in the flow chart Figure 1. evaluated for the next implementation Results discussion The last step is to discuss the analysis results and evaluate the overall research stages. RESULT AND DISCUSSION 1 Case study identification The incident of physical security occurred at university X in early 2024. The fire has burned half of the infrastructure in the server building and cause damaged not only to the physical assets but also data assets. From the assessment conducted after the fire, it is found that the department have not implemented the security standard, for example. ISO 27001 to secure the information system. 2 Literature Study Figure 1. Research flow Case study identification The first step of this research is to identify the case in university X. The investigation and observation to understand the overall problems. Literature study The approach used in this research is based on artificial intelligence method. In cyber defense or cybersecurity, there are several methods that can be used, so we attempt to propose an AIbased method in order to secure physical assets in cybersecurity. Analysis and design Analysis is the step to assess the findings in the first method and then design the method that best fit to implement in the physical security. This step may need several trials in order to make sure that the method is highly beneficial. The result of this design is a prototype that need to be The research conducted by . , shows advanced testing of physical security systems through AI/ML. The research proposed a through ways of secure the physical area with these steps: Optimization methods for low level Sensor maximum area coverage Sensor selection to minimize false alarms Randomization of guard Mechanical selection of walls and fences More advanced Facility layout with Adversary Sequence Diagrams Simulation of force on force The proposed technique is shown below in Figure 2. The research conducted by . , shows different AI methods and tools for intelligent security privacy safeguarding. In addition, unresolved problems and challenges concerning AI-driven SC are examined. Ultimately, a retail marketing case study is showcased that employs AI and intelligent security to maintain its safety and RESISTOR Journal | 3 Proposed measures to reduce the risks to an acceptable level have been deemed suitable. This research has concentrated exclusively on identifying security threats, impacts or risks, along with appropriate countermeasures for smart homes based on IoT technology. Figure 2. Physical Security with ML [Source: . ] The research conducted by . , shows there could be cybersecurity threats when standard vulnerable Industrial Control System (ICS) settings implement Industry 4. For example, if AI is utilized to manage the ICS autonomously, there is a danger that attackers could compromise ICS by targeting AI through methods like dataset pollution. It could damage both physical and logical assets, thus it is countermeasures for ICS and associated systems like AI to mitigate cyber risk. The research conducted by . , the vulnerability of the LSTM, cLSTM, biLSTM, and CNN models to adversarial attacks. The MSE values achieved through different attack techniques and epsilon values underscore the modelsAo vulnerability to adversarial changes. Greater MSE values suggest a larger divergence from the anticipated outputs and highlight a more substantial effect of the attacks on the modelsAo forecasts. The results indicate that the reliability of the models differs based on various attack techniques and epsilon The research conducted by . , the study has effectively performed an extensive security risk evaluation employing the OCTAVE Allegro approach and has recognized 10 essential cyber and physical assets. The research findings reveal that around 15 security threats arise from both internal and external factors associated with smart homes. The effects or outcomes of these risks have been outlined, presuming that the dangers materialize. 4 | RESISTOR Journal The research conducted by . , the paper proposes a structure that AI-CPS applies. The core approach of the suggested system is to create multiple classifiers and train each one A network viewpoint acknowledges the wider challenges and connections between surveillance and security measures by focusing on how organizations work together, interact, and coordinate. Studying and putting in place countermeasures is an urgent necessity for sports stadiums or arenas to safeguard their sensitive data from being compromised by unauthorized sources. Network protection based on cyber-physical systems has become confidentiality, as it stops unauthorized individuals from accessing network systems, guarantees safe direct transmission of sensitive data, and provides a strong alert mechanism for warnings and security breaches. This research examines various threats and assaults on network systems along with the typical countermeasures to mitigate the issue. The research conducted by . , the paper reviews the state of the art approaches covering different kinds of Cyber Physical Systems (CPS) and different means of security analysis using machine learning approaches and deep learning as well. There are different attacks found in the literature that need to be dealt with in a CPS. They include replay attack. DoS synchronization attack, false data injection attack and so on. The research conducted by . The main goal of this work was to utilize AI and ML techniques to enable the early identification of cyberattacks targeting the physical system. researched and analyzed several different strategies for initiating a cyberattack. In recent years, methods for initiating cyberattacks have experienced a significant evolution. Since individuals who engage in cybercrime are constantly developing new methods to bypass security protocols, there remains an ongoing demand for innovative detection systems. Due to the extensive information that had to be gathered from several diverse sources, identifying cyber attackers required utilizing methods from both AI and ML. We introduce a Fuzzy Logic Hidden Markov Model (SFL-HMM) that relies on Heuristic Multiple Swarm Optimization to detect malicious cyber behavior (HMS-ACO). The research conducted by . , a lightweight authentication protocol aided by AI in industrial medical Cyber Physical Security (CPS) utilizing a Chebyshev map was suggested to fulfill the need for real-time access. Incorporating the Chebyshev map into the lightweight authentication protocol ensures the safety of sessions and the confidentiality of patientsAo The proposed model shown in the Figure 3 below. Figure 3. Introduction Model [Source: . ] The research conduted by . , the paper reviewed various authentication schemes, blockchain-based IoT frameworks. Artificial Intelligence-driven smart decisive learning authen- tication models. Also, the article offered a comparative examination of several currently available studies important in IoT security from a traditional, blockchain, and AI viewpoint. This article concludes with the hope that upcoming authentication methods and key management solutions will effectively tackle these challenges. 3 Analysis and Design Based on the assessment of the physical environment of the system infrastructure, we proposed the prototype of physical security based on AI approach, shown in Figure 4 below. Figure 4. Physical Security Area based on AI Approach Physical security system on AI-based approach consists of two environments: Site security area or external environment External environment consists of RFID secure door as an access control. This is very basic security to allow only authority who can access. Biometric authentication and card identification double up the Closed-Circuit Television (CCTV) implemented in both areas, and are connected to IoT based smartphone. This can ensure fully-monitored devices on both areas. The CCTVs are also regularly backing up every week. Fire detection environment to prevent potential danger especially fire and other hot sources. Controlled Controlled building consists of AI-based temperature sensor for early detection. The sensor is modified into smart sensor so it can reduce temperature automatically if the sensor if above threshold value. Electrical stabilizer also implemented to prevent unstable voltage. Because from the recent incident, it is predicted that the fire is caused by the electrical short circuit. The CCTV placed in the internal environment is connected to the IOT based smarphone to make sure 24/7 monitor. CCTV logs are being stored and collected regularly, the data is used in machine learning to idetify suspicious movements such as: unclear back and forth steps, the presence of an object covering the face or head, unknown access in the secure door, and weird noises that are too low or too loud made in the are. The data is learned to predict attempts to break into the secure area. RESISTOR Journal | 5 4 Results The results of the research are the prototype that later would be implemented in the physical security site. The prototype is still in the form of simulation and proposed idea, indepth evaluation is required for this prototype to be implemented in an actual environment. University x is currently undergoing the full assessment of information security, and physical security is one of the most important aspect to be secured. AI-based tools are implemented in both external and internal area of physical infrastructure. These tools are expected to detect potential rise of temperature or unstable electrical activity in the internal building. Purwokerto University for their support and additional funding regarding this paper. REFERENCES